Schedule by day

Working Sessions

Working Sessions

when Monday Tuesday Wednesday Thursday Friday
Create Wardley Maps for multiple security scenarios
Creating content session
Juice Shop Hack'n'Code I
Open Session
Restructure session
SAMM DevOps Guidance
Towards a unified way of describing threat models
Agile Practices for Security Teams
Creating content session
Cyber Insurance
Cyber Risk Modeling
Dealing with Security Findings in the Enterprise
DevSecOps Maturity Model (DSOMM)
Juice Shop Hack'n'Code II
OWASP Application Security Curriculum Project
OWASP Collective Defence Cluster (CDC) - two years on
Restructure session
SAMMv2 working session - Design
SAMMv2 working session - Governance
SAMMv2 working session - Implementation
SAMMv2 working session - Operations
SAMMv2 working session - Verification
Share your playbooks and release them under Creative Commons
Share your security polices and release them under CC
Using Threat Models for GDPR
ZAP working session - automation
ZAP working session - the HUD
Application Security Verification Standard
Creating content session
Describe different ways of implementing TM in agile organisations
How do we persist the information from the TM Slack channel?
Juice Shop Challenge Refactoring
Juice Shop Hack'n'Code III
SAMMv2 Establish the Document Model
SAMMv2 Measurement Model
SOC Monitoring Visualisation
State and future of threat modeling
Using User Story Mapping for effective communication
ZAP working session - future plans
Azure Serverless for security
CISO Ask Me Anything (AMA)
Cell based Structures for Security
Creating content session
Cynefin Framework for Security
From Threat Modeling to DevSecOps metrics
GCP Serverless for security
Hacking ML Applications
How to scale Threat Modeling.
Integrating Security Tools in the SDL
Juice Shop Hack'n'Code IV
ML for Scaling Security Analysis
Meet the ICO
OWASP SAMM Tooling
Owasp Testing Guide v5
PSD2 Security
Real world ML case-studies
SAMM benchmarking
Scaling API Security
Securing Kubernete's hosted APIs
Securing Serverless applications
Securing the CI Pipeline
Using Data Science for log analysis
Using Lambda functions to scale security teams
Using Lambda functions to scale security teams
Creating content session
Customising the Chaos Engineering Toolkit
Owasp Top 5 Machine Learning risks
Real world Chaos Engineering
Share your Threat Models diagrams and create a Book
Sessions not mapped to an day and time
  • Creating a Security Champions network
  • Creating a Threat Library
  • Creating content session
  • Restructure session

    User Sessions

    Monday Tuesday Wednesday Thursday Friday
    Create a Slack bot in Python
    Mobile Security Testing Guide onboarding
    OWASP Mobile Security Testing Guide 101
    SAMM - Best Practices
    SAMM Introduction
    SAMM Round Table
    Ask me anything (AMA) on GDPR
    Creating ELK Dashboards
    Juice Shop 101
    Juice Shop Contributor Onboarding
    Using Wardley maps on SOC
    Zap - How to use it
    Creating Appsec metrics and visualisation
    Juice Shop Round Table
    Juice Shop Release Night
    Using graphs for GDPR mappings and visualisations
    Writing security tests to confirm vulnerabilities and fixes