<div dir="ltr">Thanks Sharp, Update Link: <a href="https://www.eventbrite.com/e/june-owasp-chapter-meeting-at-osisoft-tickets-25911192073">https://www.eventbrite.com/e/june-owasp-chapter-meeting-at-osisoft-tickets-25911192073</a></div><div class="gmail_extra"><br><div class="gmail_quote">On Mon, Jun 6, 2016 at 4:15 PM, Sharp Hall <span dir="ltr"><<a href="mailto:sharp@sauropod.org" target="_blank">sharp@sauropod.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi Aaron,<br>
<br>
I think the link you sent out is a link to publish the event, not a link to the event itself. I am unable to view it.<br>
<br>
Best,<br>
Sharp<span class=""><br>
<br>
On 2016-06-06 3:19 pm, Aaron Weaver wrote:<br>
<br>
</span><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">
Hi all, Hope to see you at our next meeting at OSISoft on June 14th.<br>
<br>
Register here: <a href="https://www.eventbrite.com/publish?crumb=d2cc4245a75261&eid=25911192073" rel="noreferrer" target="_blank">https://www.eventbrite.com/publish?crumb=d2cc4245a75261&eid=25911192073</a><br>
<br></span>
TITLE: BUILDING A THREAT MODELING PRACTICE IN 7 EASY STEPS<br>
<br>
PRESENTER:  Anurag Agarwal<span class=""><br>
<br>
Integrating security into the Software Development Life Cycle is a proven way to enhance software security and by building threat models, an organization can create a threat profile of its application portfolio and classify threats under various risk categories to prioritize mitigation efforts.<br>
<br>
The prevalence of web hacking incidents coupled with the ever-changing threat landscape has heightened the importance of establishing a consistent and repeatable threat modeling process to help enforce application security policy across the enterprise in an effort to minimize risk exposure.<br>
<br>
In this 45 minute presentation, Anurag Agarwal will show you how you can build a repeatable, scalable, threat modeling process in 7 easy steps, allowing organizations to manage their risk more effectively and efficiently.<br>
<br></span>
TITLE: ANDROID PENTESTING<br>
PRESENTER: Sandeep Jayashankar<span class=""><br>
--<br>
<br>
Aaron Weaver<br>
Philadelphia OWASP Chapter Lead OWASP AppSec Pipeline Lead<br>
<a href="https://www.owasp.org/index.php/OWASP_AppSec_Pipeline" rel="noreferrer" target="_blank">https://www.owasp.org/index.php/OWASP_AppSec_Pipeline</a><br>
<br></span>
_______________________________________________<br>
OWASP-Philadelphia mailing list<br>
<a href="mailto:OWASP-Philadelphia@lists.owasp.org" target="_blank">OWASP-Philadelphia@lists.owasp.org</a><br>
<a href="https://lists.owasp.org/mailman/listinfo/owasp-philadelphia" rel="noreferrer" target="_blank">https://lists.owasp.org/mailman/listinfo/owasp-philadelphia</a><br>
</blockquote>
_______________________________________________<br>
OWASP-Philadelphia mailing list<br>
<a href="mailto:OWASP-Philadelphia@lists.owasp.org" target="_blank">OWASP-Philadelphia@lists.owasp.org</a><br>
<a href="https://lists.owasp.org/mailman/listinfo/owasp-philadelphia" rel="noreferrer" target="_blank">https://lists.owasp.org/mailman/listinfo/owasp-philadelphia</a><br>
</blockquote></div><br><br clear="all"><div><br></div>-- <br><div class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><span style="font-size:12.8px">Aaron Weaver</span></div><div>Philadelphia OWASP Chapter Lead</div><span style="font-size:12.8px">OWASP AppSec Pipeline Lead</span><br style="font-size:12.8px"><a href="https://www.owasp.org/index.php/OWASP_AppSec_Pipeline" style="color:rgb(17,85,204);font-size:12.8px" target="_blank">https://www.owasp.org/index.php/OWASP_AppSec_Pipeline</a><span style="font-size:12.8px"> </span><br style="font-size:12.8px"><br></div></div>
</div>