[Owasp-leaders] Looking for better suggestions on content promotion

Sam Stepanyan sam.stepanyan at owasp.org
Mon Nov 7 18:35:55 UTC 2016


YouTube channel worked best for us at OWASP London Chapter. It allows 
people to subscribe to new videos and also the videos do come up in 
search results and suggestions on both YouTube and Google.

You will need at least 100 subscribers to give your channel a memorable 
name (e.g. OWASP_MSP).

Basically we asked everyone attending the chapter meeting to subscribe 
to the YouTube channel and tweet about it  - it worked, so now we have:


One other trick which we have found very useful is to have short 2-4 
minute clips with some interesting content from the full talk (e.g. the 
demo bit) with a link to the video of the full talk.

For example:

" How To Hack a Website with the Harlem Shake - Why Security Headers are 


This video is less than 5 minutes long and is an excerpt from the full 
52-minute talk. Most people who watch this clip then do watch the full 
talk video and subscribe to the channel. YouTube also provides a handy 
statistics tool.

Hope this helps.


Sam (@owasplondon)


Sam Stepanyan
OWASP London Chapter Leader
sam.stepanyan at owasp.org
Follow OWASP London Chapter on Twitter: @owasplondon
"Like" us on Facebook: https://www.facebook.com/OWASPLondon

On 07/11/2016 13:26, Todd Dahl wrote:
> My chapter has started to release our monthly chapter presentation as 
> video. Unfortunately I don't have the "marketing" skill to know how to 
> best promote it. I was wondering what other chapters do or suggestions 
> that you have to really get it "out there".
> So our latest presentation...(see below)
> Oct 2016 OWASP MSP Chapter meeting presentation -- http://bit.ly/2f7w8kF
> Depending on Vulnerable Libraries  -- Jeremy Long
> Java applications built today use several third-party libraries and 
> frameworks. We depend on these building blocks so we can build 
> applications faster. However, if one of the libraries we depend on has 
> a known, published vulnerability, then our application may have 
> inherited that vulnerability. This session covers the OWASP 
> Dependency-Check project. It discusses how the tool works and how you 
> can integrate it into your application build process to validate 
> whether or not your application is using known vulnerable libraries.
> These are the activities I have done.
> 1. Posted the presentation to Vimeo. (Working on getting a youtube 
> channel up)
> 2. Posted mention of it to our Meetup.com group - for our chapter members
> 3. Announced it on LinkedIn
> Inline image 1
> 4. Announced it on Twitter
> Inline image 2
> So I'm sure there are better ways to do all of this. Better ways to 
> market this. I am hoping to get some good solid feedback and 
> suggestions from you all.
> I know what I am doing is getting some traction though because I see 
> traffic from all over the world hitting it but I know it can be much 
> better.
> Thanks,
> -Todd
> _______________________________________________
> OWASP-Leaders mailing list
> OWASP-Leaders at lists.owasp.org
> https://lists.owasp.org/mailman/listinfo/owasp-leaders

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.owasp.org/pipermail/owasp-leaders/attachments/20161107/6ff6de59/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/png
Size: 162045 bytes
Desc: not available
URL: <http://lists.owasp.org/pipermail/owasp-leaders/attachments/20161107/6ff6de59/attachment-0002.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: image/png
Size: 158894 bytes
Desc: not available
URL: <http://lists.owasp.org/pipermail/owasp-leaders/attachments/20161107/6ff6de59/attachment-0003.png>

More information about the OWASP-Leaders mailing list