OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.
Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member?
You are Invited for the OWASP Chennai chapter Kick off Meeting - 2 February 2007
This first meeting will serve as an introduction to OWASP and will have a discussion centered around our activities for the year 2007.
14.00 - 14.15: Welcome & Member Introduction 14.15 - 14.30: OWASP Introduction, Anand,Cognizant 14.30 - 15.30: Presentation on Phishing, Sreemathy Varadan, Cognizant [Download Presentation] 15.30 - 16.00: Discussion - Meeting Schedule for 2007, Chennai Chapter Activities
Cognizant Technology solutions will be the sponsor for this meeting and the location would be
Third Floor, Elnet Software City, T.S.140, Block 2&9 C.P.T.Road, Taramani, Chennai - 600113
For any queries, pls call 044-42284056.
Pls confirm your participation by sending a mail to firstname.lastname@example.org
Pls note that all OWASP chapter meetings are free and there will not be any vendor pitches or sales presentations at OWASP meetings
Checklist for Identifying Vulnerabilities - Web applications have come a long way from displaying static content. Current day web applications are more dynamic in nature and are driven by external inputs such as user entered information which may come from the user himself/herself or from an external source like a database. Web applications behaving dynamically has also resulted in vulnerabilities creeping into them... [More]