Sessions Social Media


Admin | Sessions Social Media

This page will help to reach out to organisers using Social media

Mon

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1A perspective on automating 3rd party risk assessment. How to free up your staff, and improve speed by automaton with guardrails.Mon15:00 - 16:00Governance GovernanceOwen JohnOwen JohnOwen Johncreate tweet
2A workshop on DAST and how to put it into your pipelineMon16:00 - 17:00DevSecOps DevSecOpsTanya Jancatanya-janca@shehackspurplecreate tweet
3Addressing the cyber unemployment crisis; a positive outlookMon15:00 - 16:00Governance GovernanceRichea Perrycreate tweet
4AI-Driven Threat Modelling with STRIDE GPTMon16:00 - 17:00Threat Modeling Threat ModelingMatthew Adamscreate tweet
5AMA with OWASP BoardMon16:00 - 17:00missingDinis Cruz , Grant Ongers , Andrew van der Stock , Vandana Vermadiniscruz rewtd vanderaj @DinisCruz @rewtd @vanderaj @InfosecVandanacreate tweet
6An AppSec guide to practical cryptographyMon18:00 - 19:00DevSecOps DevSecOpsLarkins Carvalholarkinscarvalho@LarkinsCarvalhocreate tweet
7Application Security vulnerabilities - measurements, maturity magic - Vulnerability Framework ProjectMon16:00 - 17:00DevSecOps DevSecOpsFrancesco Cipollonefracipo@FrankSEC42create tweet
8AttackGen: Harnessing Language Models for Cybersecurity SimulationsMon18:00 - 19:00DevSecOps DevSecOpsMatthew Adamscreate tweet
9Automating SOC2 using JiraMon20:30 - 22:00Governance GovernanceDinis Cruz , Luke Robbertse , Abbas Haidardiniscruz luke-robbertse-04116abb abbashaidar@DinisCruz @LukeRobbertse @AbbasHaidar_create tweet
10Beginners Threat ModelingMon18:30 - 20:30Threat Modeling Threat ModelingJames Bore , James Borejbore jbore@Coffee_Fueled @Coffee_Fueledcreate tweet
11Behaviour Change and AwarenessMon18:00 - 19:00Risk and Governance Risk and GovernanceTim Ward , Dinis Cruz , Danusia Rolewicz , Janet Bonar Lawtim-ward-cyber diniscruz@thinkcyberuk @DinisCruzcreate tweet
12Can we trust AI with our Cyber defences?Mon16:00 - 17:00Governance GovernanceJames Dellcreate tweet
13Challenges in IoT security: from infinite recommendations to a plethora of implementationsMon15:00 - 16:00Governance GovernanceMaya Boeckhnicolas-boeckh@AtomicNicoscreate tweet
14Creating a Scalable API Test Framework using AWS and ElasticMon18:00 - 19:30DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
15CVE CWE CVSS CWSS where do I look first?Mon16:00 - 18:00Governance GovernanceFrancesco Cipollonefracipo@FrankSEC42create tweet
16Data CultureMon19:00 - 20:00Wardley Maps Wardley MapsDinis Cruz , Tudor Girba , Tariq Rashid , Mark Craddock , Pages(1)diniscruz girba Mark Craddock Pages(1)@DinisCruz @feenkcom @rzeta0 Mark Craddock Pages(1)create tweet
17Dependency Management and Supply Chain SecurityMon15:00 - 16:00Governance GovernanceChristian Köberl@derkoecreate tweet
18DevSecOps beyond CI/CD pipelinesMon20:00 - 21:00DevSecOps DevSecOpsAnna Lezhikovacreate tweet
19Doing Compliance Differently: Policies as Code, Evidence-based compliance through automationMon20:00 - 21:00DevSecOps DevSecOpsLuis Servin@lfservincreate tweet
20For bugs start with a passing test (and 99% code coverage)Mon17:00 - 18:00Owasp OwaspDinis Cruzdiniscruz@DinisCruzcreate tweet
21How to perform threat assessments, the right way!Mon17:00 - 18:00Threat Modeling Threat ModelingSaber Ferjanisaberferjani@cyris360create tweet
22How we build a security automation software utilizing open-source components (Betterscan.io)Mon15:00 - 16:00DevSecOps DevSecOpsMarcin Kozlowskimarcinguy@marcinguycreate tweet
23Improving Mental Health & Security Outcomes Through Flow StatesMon17:00 - 18:00Governance GovernanceKashyap Thimmarajucreate tweet
24IoT: pervasive vulnerability, threat landscape and end-usersMon15:00 - 16:00Threat Modeling Threat ModelingMaya Boeckhnicolas-boeckh@AtomicNicoscreate tweet
25Jira Schemas and Workflows for AppSec and Risk ManagementMon18:00 - 19:30Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
26Keynote - Open Security Summit 2020MonmissingKeynotes KeynotesOpen Security Summitcreate tweet
27Kubernetes Clusters Network SecurityMon17:00 - 18:00missingDinis Cruz , Nathan Casediniscruz nathancase@DinisCruz @karmichandcreate tweet
28Lessons learned from trying to create Architecture Diagrams As CodeMon16:00 - 17:00DevSecOps DevSecOpsMartin Obiolsmobiols@olemoudicreate tweet
29Mapping Threat Intelligence: Enhancing Situational Awareness (Panel)Mon16:00 - 17:00Governance GovernanceDinis Cruz , Marius Poskus , Simon Wardleydiniscruz marius-poskus-92611b22 @DinisCruz @Marius_poskus1 @swardleycreate tweet
30Mental Health in Cyber SecurityMon17:00 - 18:00Governance GovernanceSarb Sembhi , Dr Daniel Shore , Kashyap Thimmaraju , Rebecca McKeown , Peter Olivier , Paul Simmssarbsembhi rebeccamckeowncpsycho peterolivier@sarbsembhi @mindscience6 @olivier_petercreate tweet
31New OSS ProjectsMon18:00 - 19:30 MiscDinis Cruzdiniscruz@DinisCruzcreate tweet
32Open source modern access controlMon18:00 - 19:30DevSecOps DevSecOpsOr Weisorweis@OrWeiscreate tweet
33Panel - Prioritizing Risks and Vulnerabilities based on ContextMon15:00 - 16:00Risk and Governance Risk and GovernanceDinis Cruz , Petra Vukmirovic , Francesco Cipollonediniscruz petravukmirovic fracipo@DinisCruz @PetraVuk1311 @FrankSEC42create tweet
34Panel - Wardley Maps in Cyber SecurityMon16:00 - 17:00missingDinis Cruz , Simon Wardley , Krzysztof Daniel , Nick Harrisdiniscruz christopherdaniel@DinisCruz @swardley @wardleymapscreate tweet
35Parsec-Hardware security at your fingertipsMon17:00 - 18:00DevSecOps DevSecOpsPaul Howardpaulhoward4@PaulHoward5create tweet
36Playing at Security: Designing, building, and running tabletop scenarios for fail-safe incident handling and incident response trainingMon18:30 - 20:30Secure by Scenario Secure by ScenarioJames Borejbore@Coffee_Fueledcreate tweet
37Privacy-The Challenges in Post Tornado Cash WorldMon17:00 - 18:00DevSecOps DevSecOpsAnish Mohammed , John Marshall , Dinis Cruzanishmohammed marshalljd diniscruz@anishmohammed @_jdmarshall @DinisCruzcreate tweet
38Quantifying Usability In Security Designs and Risk AssessmentsMon18:00 - 19:00Governance GovernanceDinis Cruz , Tariq Rashid , Izar Tarandachdiniscruz izartarandach@DinisCruz @rzeta0 @izar_tcreate tweet
39Remote Threat ModelingMon15:00 - 16:00Threat Modeling Threat ModelingDidar Gelicididargelici@DGelicicreate tweet
40Scaling Threat Models visualisations using PlantUML and VisJSMon15:00 - 16:00DevSecOps DevSecOpsDinis Cruz , Petra Vukmirovic , M. Lucía Pappaterra , Chris Diao , Lwasampijja Baker , Abbas Haidardiniscruz petravukmirovic abbashaidar@DinisCruz @PetraVuk1311 @AbbasHaidar_create tweet
41Schrems II - Transfer risk triage and other adventures in scopingMon18:30 - 20:30Schrems II Schrems IISarah Clarkecreate tweet
42SDA SE Cluster Scanner is going Open SourceMon16:00 - 17:00DevSecOps DevSecOpsTimo Pagelcreate tweet
43Secure by Scenario - Data breach at the North PoleMon18:30 - 20:30Secure by Scenario Secure by ScenarioJames Borejbore@Coffee_Fueledcreate tweet
44Secured Digital WorkspaceMon20:00 - 21:00DevSecOps DevSecOpsJude Pereiracreate tweet
45Shift Smart - risk based approach on appsecMon16:00 - 17:00DevSecOps DevSecOpsFrancesco Cipollonefracipo@FrankSEC42create tweet
46Shift-Right Security: Emphasizing Post-Deployment Monitoring and Response (Panel)Mon15:00 - 16:00DevSecOps DevSecOpsDinis Cruz , Omer Yaron , Marius Poskusdiniscruz marius-poskus-92611b22@DinisCruz @Marius_poskus1create tweet
47Shodan OSINT Automation to Mass Exploitation of VulnerabilitiesMon14:00 - 15:00DevSecOps DevSecOpsDheeraj Madhukardheerajtechnolegends@Dheerajmadhukarcreate tweet
48SOAR - Security Orchestration, Automation, and Response (Panel)Mon17:00 - 18:00DevSecOps DevSecOpsDinis Cruz , Venkat Ramshet , Pratibha Malik , Pages(1)diniscruz venkat-ramshet Pratibha Malik Pages(1)@DinisCruz @FlexibleIr Pratibha Malik Pages(1)create tweet
49Starbase - Graph-based security analysis for everyoneMon15:00 - 16:00DevSecOps DevSecOpsAustin Kelleher , Adam Piersonaustinkelleher@AustinKellehercreate tweet
50Supply Chain Security: Strengthening Resilience Against Third-Party Risks(panel)Mon16:00 - 17:00Governance GovernanceDinis Cruz , Marius Poskusdiniscruz marius-poskus-92611b22@DinisCruz @Marius_poskus1create tweet
51The next Insider Threat isn't your staff!Mon17:00 - 18:00Governance GovernanceSarb Sembhisarbsembhi@sarbsembhicreate tweet
52The Survival Guide to implementing Threat ModelingMon19:00 - 20:00Threat Modeling Threat ModelingMiguel Llamazares , Dave van Steindvstein@Dave_von_Screate tweet
53The Truth about suffering a cyber-attackMon17:00 - 18:00Risk and Governance Risk and GovernanceJames Dellcreate tweet
54The value of CTO/CISOs and how to make it workMon18:00 - 19:00Governance GovernanceDinis Cruz , Mario Platt , Christofer Hoffdiniscruz Christofer Hoff@DinisCruz Christofer Hoffcreate tweet
55Threat Modeling Failure ModesMon17:00 - 18:00Threat Modeling Threat ModelingIzar Tarandachizartarandach@izar_tcreate tweet
56Threat Modeling Kata Part 2Mon17:00 - 18:00Threat Modeling Threat ModelingLuis Servin@lfservincreate tweet
57Threat Modeling PlaybookMon18:30 - 20:30Threat Modeling Threat ModelingSebastien Deleersnyder , Didar Gelicididargelici@sebadele @DGelicicreate tweet
58Threat Modeling the LLM PipelineMon16:00 - 17:00Threat Modeling Threat ModelingBrandon Greencreate tweet
59Threat Modelling Adoption in Disciplines Other Than DevelopmentMon18:00 - 19:00Threat Modeling Threat ModelingMarius Poskus , Dinis Cruzmarius-poskus-92611b22 diniscruz@Marius_poskus1 @DinisCruzcreate tweet
60Threat Modelling as Code v2Mon15:00 - 16:00Threat Modeling Threat ModelingPetra Vukmirovic , Chen Gour-Ariepetravukmirovic@PetraVuk1311create tweet
61Threat Models and Wardley MapsMon18:00 - 19:30Threat Modeling Threat ModelingBrook S.E. Schoenfield , Dave van Stein , Dinis Cruz , Izar Tarandach , Jakub Kaluzny , Krzysztof Danielbrookschoenfield dvstein diniscruz izartarandach jakubkaluzny christopherdaniel@brkschoenfield @Dave_von_S @DinisCruz @izar_t @j_kaluzny @wardleymapscreate tweet
62Threats categorization, pitfalls, different ways of applying it in practiseMon18:30 - 20:30Threat Modeling Threat ModelingJames Borejbore@Coffee_Fueledcreate tweet
63Using VPC Flows to monitor EC2 TrafficMon16:00 - 17:00DevSecOps DevSecOpsMichael Hidalgocreate tweet
64Utilising Security Champions Product TeamsMon15:00 - 16:00Governance GovernanceKimberley Grahamkimberleyhendry@Kimberley_HGcreate tweet
65Wardley Maps and services model at GlasswallMon16:00 - 17:00Wardley Maps Wardley MapsSteve Purkis@spurkiscreate tweet
66Web application's language negotiation in 2023Mon15:00 - 16:00Governance GovernanceAndré Ferreiracreate tweet
67What to do in preparation for a Threat ModelMon16:00 - 17:00Governance GovernancePetra Vukmirovic , Abbas Haidar , Chris Holmanpetravukmirovic abbashaidar@PetraVuk1311 @AbbasHaidar_create tweet
68Women in Cyber Security: Personal experiences and how to be an AllyMon16:00 - 17:00Governance GovernanceAshley Burke , Karla Reffold , Melissa Ryan , Jana Canigliaashburke karlareffold@burkethelobster @karla_reffoldcreate tweet
69Zero Trust Network Access FrameworkMon17:00 - 18:00DevSecOps DevSecOpsJude Pereiracreate tweet

Tue

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1“Shift Left” Isn’t What You ExpectedTue15:00 - 16:00Risk and Governance Risk and GovernanceChen Gour-Ariecreate tweet
2Abuse Tests for DevelopersTue16:00 - 18:00DevSecOps DevSecOpsTimo Pagelcreate tweet
3Advanced Persistent Threat (APT) Mapping and MitigationTue17:00 - 18:00Wardley Maps Wardley MapsDinis Cruz , Simon Wardleydiniscruz @DinisCruz @swardleycreate tweet
4AMA with Alyssa MillerTue20:00 - 21:00 EducationIzar Tarandach , Alyssa Millerizartarandach Alyssa Miller@izar_t Alyssa Millercreate tweet
5AMA with Jeremiah GrossmanTue20:30 - 22:00DevSecOps DevSecOpsDinis Cruz , Jeremiah Grossmandiniscruz grossmanjeremiah@DinisCruz @jeremiahgcreate tweet
6API Security by DesignTue16:00 - 17:00DevSecOps DevSecOpsJose Haro Peraltacreate tweet
7Applying Zero Trust Principles to OT/ICS (Operational Technology & Industrial Control Systems)Tue16:00 - 17:00DevSecOps DevSecOpsCeline Pypaertceline-cp@_queuebitscreate tweet
8AppSec Threats Deserve Their Own Incident Response PlanTue15:00 - 16:00DevSecOps DevSecOpsOmer Yaroncreate tweet
9Attack Surface MappingTue17:00 - 18:00Governance GovernanceSimon Wardley , Dinis Cruz , Tariq Rashid , Krzysztof Daniel , Tudor Girbadiniscruz christopherdaniel girba@swardley @DinisCruz @rzeta0 @wardleymaps @feenkcomcreate tweet
10Battling the coming wave, Understanding cybersecurity in 2024Tue17:00 - 18:00Governance GovernanceJames Dellcreate tweet
11ChatGPT: Cyber Risks & How to Harden Against ThemTue17:00 - 18:00 ChatGPTCeline Pypaert , Craig Gilliver , Pages(1) , Pages(1)celine-cp Craig Gilliver Pages(1) Pages(1)@_queuebits Craig Gilliver Pages(1) Pages(1)create tweet
12CISO Role in 2023 (Panel)Tue16:00 - 17:00Governance GovernanceDinis Cruz , Sheetal Joseph , Abbas Haidar , Tim Ward , Sarb Sembhidiniscruz abbashaidar tim-ward-cyber sarbsembhi@DinisCruz @AbbasHaidar_ @thinkcyberuk @sarbsembhicreate tweet
13CISO Roundtable - Mar 2022Tue17:00 - 18:00Governance GovernanceAnte Gulam , Chase Fopiano , Dinis Cruz , Nick Gibson , Marios Clark , Sheetal Josephagulam myvirtualciso diniscruz nickbgibson marios-clark@ante_gulam @MyVirtualCISO @DinisCruz @SecurityIdeals @n3tw0rks3ccreate tweet
14Compliant Kubernetes - Case StudyTue16:00 - 17:00DevSecOps DevSecOpsJakub Krzywda , Cristian Kleincreate tweet
15Content Delivery & Security AssociationTue17:00 - 18:00Governance GovernanceBen Schofieldcreate tweet
16Continuous Access Control with OPAL and CedarTue16:00 - 17:00DevSecOps DevSecOpsGabriel L. Manorgmanor@gemanorcreate tweet
17Creating 1 million kubernetes pods - Lessons learnedTue17:00 - 18:00DevSecOps DevSecOpsMatthew Pigram , Dharam Patelcreate tweet
18CVSS, CVE, Vulnerabilities and the land of broken dreamsTue15:00 - 16:00DevSecOps DevSecOpsFrancesco Cipollonefracipo@FrankSEC42create tweet
19Cyber Insurance - a deeper approachTue18:00 - 19:00Governance GovernanceDinis Cruz , Abbas Haidar , Andrew Leadiniscruz abbashaidar Andrew Lea@DinisCruz @AbbasHaidar_ Andrew Leacreate tweet
20Cybersecurity assessments: finding the way forwardTue18:00 - 19:00Risk and Governance Risk and GovernanceAnna Lezhikovacreate tweet
21Demystifying Risk and the Future of Vulnerability ManagementTue14:00 - 15:00Governance GovernanceSashank Darasashankdara@sashank_daracreate tweet
22Deterministic GenAI Outputs with ProvenanceTue16:00 - 17:00 GenAIDinis Cruzdiniscruz@DinisCruzcreate tweet
23Developing Secure Multi-Cloud Kubernetes ApplicationsTue15:00 - 16:00Kubernetes KubernetesPetra Vukmirovic , Dinis Cruzpetravukmirovic diniscruz@PetraVuk1311 @DinisCruzcreate tweet
24Encrypted Calendars - the need and consequencesTue18:30 - 20:30Governance GovernanceMark Potkewitzpotkewitz@potkewitzcreate tweet
25From Kubernetes to a Portable Secure and Compliant Platform: Databases, Message Queues and CachesTue14:00 - 15:00Kubernetes KubernetesCristian Kleincreate tweet
26Graph Based Vulnerability ManagementTue15:00 - 16:00Governance GovernanceChris Holman , Petra Vukmirovicpetravukmirovic@PetraVuk1311create tweet
27Hacking OAuth: An Attacker's View of Your OAuth FlowsTue19:00 - 20:00DevSecOps DevSecOpsSheshananda Reddy KandulaSheshananda Reddy KandulaSheshananda Reddy Kandulacreate tweet
28How GenAI Agents will Dramatically Change our IndustryTue18:00 - 19:00DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
29How Owasp can help Security Teams - Guides and Testing ToolsTue15:00 - 16:00Owasp OwaspDinis Cruz , Sam Stepanyan , Grant Ongers , Vandana Vermadiniscruz rewtd @DinisCruz @securestep9 @rewtd @InfosecVandanacreate tweet
30How Owasp can help Security Teams - Guides and Testing ToolsTue16:00 - 17:00missingDinis Cruz , Sam Stepanyan , Grant Ongers , Vandana Vermadiniscruz rewtd @DinisCruz @securestep9 @rewtd @InfosecVandanacreate tweet
31How to Operate a Secure Kubernetes platformTue18:00 - 19:00DevSecOps DevSecOpsCristian Kleincreate tweet
32Incident Response Playbooks (Panel)Tue17:00 - 18:00missingDinis Cruz , Eliza-May Austin , Venkat Ramshet , Nick Harrisdiniscruz elizamayaustin venkat-ramshet@DinisCruz @Eliza_MayAustin @FlexibleIrcreate tweet
33IoT and Cyber Threat Intelligence: Staying Ahead of the Curve (Panel)Tue15:00 - 16:00DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
34Managing projects using Github Issues and ZenHubTue17:00 - 18:00Owasp OwaspGeorgina Gonzalezcreate tweet
35Mitigating Risks Through Open-Source Bitcoin TracingTue18:30 - 20:30DevSecOps DevSecOpsMargaux EckleMargaux EckleMargaux Ecklecreate tweet
36Moldable development with Glamorous Toolkit Part 1Tue16:00 - 17:00missingDinis Cruz , Tudor Girbadiniscruz girba@DinisCruz @feenkcomcreate tweet
37OISRU - Open Information Security Risk Universe (Panel)Tue15:00 - 16:00Governance GovernanceSashank Dara , Dinis Cruz , Eliza-May Austin , Puneet Ahujasashankdara diniscruz elizamayaustin@sashank_dara @DinisCruz @Eliza_MayAustincreate tweet
38Open Policy AgentTue17:00 - 18:00DevSecOps DevSecOpsTimo Pagelcreate tweet
39OSS DevSecOps projetTue18:00 - 19:30DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
40OWASP Top Ten Part 2Tue20:00 - 21:00DevSecOps DevSecOpsJim Manicojmanico@manicodecreate tweet
41OWASP WrongSecrets: a journey into secret management failuresTue15:00 - 16:00Governance GovernanceJeroen Willemsenjeroen-willemsen@commjoeniecreate tweet
42Permission Models As Code - Securing the Entire StackTue17:00 - 18:00DevSecOps DevSecOpsRaz Cohen , Oded Ben Davidodedbendavid@BDOdedcreate tweet
43Practical approach/considerations to developing a cybersecurity programTue15:00 - 16:00Governance GovernanceRichea Perrycreate tweet
44Privacy As Code: Open-Source Developer Tools For Data PrivacyTue15:00 - 16:00DevSecOps DevSecOpsThomas La Pianacreate tweet
45Protecting Critical Data, through the implementation of Information Security Management System to meet complianceTue15:00 - 16:00Governance GovernanceRichea Perrycreate tweet
46Refresher on Security LabelsTue18:30 - 20:30Security Labels Security LabelsDinis Cruz , James Bore , David Clarke , Adam Leon Smithdiniscruz jbore @DinisCruz @Coffee_Fueled @1DavidClarke @adamleonsmithcreate tweet
47Regulatory Developments in Cybersecurity(Panel)Tue17:00 - 18:00Governance GovernanceDinis Cruz , Alan Jenkinsdiniscruz alanjenkins@DinisCruz @TheCybrSecNavcreate tweet
48Risk Communication: Bridging the Gap between Risk Professionals and Executives (Panel)Tue16:00 - 17:00Governance GovernanceDanny Lopez , Richea Perry , Pages(1) , Pages(1) , Pages(1) , Pages(1)Danny Lopez Pages(1) Pages(1) Pages(1) Pages(1)Danny Lopez Pages(1) Pages(1) Pages(1) Pages(1)create tweet
49Rules & Recommendations: Are we pushing our new IoT device out correctly?Tue16:00 - 17:00Governance GovernanceMaya Boeckhnicolas-boeckh@AtomicNicoscreate tweet
50Scaling Kubernetes - One Pod per fileTue18:30 - 20:30DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
51Schrems II - Finding workable solutionsTue18:30 - 20:30Schrems II Schrems IIDinis Cruz , James Bore , David Clarke , Adam Leon Smith , Carey Lening , Mark Potkewitzdiniscruz jbore potkewitz@DinisCruz @Coffee_Fueled @1DavidClarke @adamleonsmith @potkewitzcreate tweet
52Security as Code: A DevSecOps ApproachTue16:00 - 17:00DevSecOps DevSecOpsJoseph Katsioloudesjkcso@jkcsocreate tweet
53Security Champions - Sharing ExperiencesTue17:00 - 18:00Governance GovernanceDinis Cruz , Timo Pageldiniscruz@DinisCruzcreate tweet
54SemGrep in the CI/CD Pipeline: Automating Code Quality and Security Checks (Panel)Tue15:00 - 16:00Semgrep SemgrepDinis Cruzdiniscruz@DinisCruzcreate tweet
55Software Security and Threat ModellingTue18:00 - 19:30Threat Modeling Threat ModelingBrook S.E. Schoenfieldbrookschoenfield@brkschoenfieldcreate tweet
56Stop Committing Your Secrets - Git Hooks To The RescueTue18:00 - 19:00DevSecOps DevSecOpsDwayne McDanieldwaynemcdaniel@mcdwaynecreate tweet
57Taking Your DevOps Tooling To The Dark SideTue17:00 - 18:00DevSecOps DevSecOpsMike GuthrieMike GuthrieMike Guthriecreate tweet
58The Business case for Security ChampionsTue18:00 - 19:30Governance GovernanceDinis Cruz , Oludiniscruz Olu@DinisCruz Olucreate tweet
59The Cloud Security Architects aka the knights of the cloud kingdom - Panel DiscussionTue15:00 - 16:00 Cloud-SecurityPetra Vukmirovic , Manos Skalidis , Francesco Cipollone , Lee Newcombe , Kriti Mohunpetravukmirovic emanouilskalidis fracipo leenewcombe/ kritimohun@PetraVuk1311 @MSkalidis @FrankSEC42 @lee_newcombe @krytron123create tweet
60The Cybersecurity Talent Gap: Addressing the Growing Skills Shortage(Panel)Tue17:00 - 18:00Governance GovernanceDinis Cruz , Chen Gour-Ariediniscruz@DinisCruzcreate tweet
61The Human FirewallTue15:00 - 16:00Governance GovernanceRichea Perrycreate tweet
62Threat Hunting and Detection Strategies: Proactive Defense in Action (panel)Tue15:00 - 16:00Threat Modeling Threat ModelingDinis Cruz , Marius Poskusdiniscruz marius-poskus-92611b22@DinisCruz @Marius_poskus1create tweet
63Threat mapping - A workshop discussionTue16:00 - 18:00Threat Modeling Threat ModelingJakub Kaluznyjakubkaluzny@j_kaluznycreate tweet
64Threat Modeling Glasswall DesktopTue16:00 - 17:00Threat Modeling Threat ModelingDinis Cruz , Petra Vukmirovic , Mudit Guptadiniscruz petravukmirovic @DinisCruz @PetraVuk1311 @Mudit__Guptacreate tweet
65Threat Modeling Kata VITue16:00 - 17:00DevSecOps DevSecOpsLuis Servin@lfservincreate tweet
66Threat Modeling VTue16:00 - 17:00DevSecOps DevSecOpsLuis Servin@lfservincreate tweet
67Tune your Toolbox for Velocity and Value (SCA)Tue14:00 - 15:00DevSecOps DevSecOpsJosh Grossmanjoshcgrossman@JoshCGrossmancreate tweet
68Using Elastic and Kibana for Scale and Security VisualisationTue18:00 - 19:30DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
69Using Kubernetes to create a scalable Security Proxy solutionTue18:30 - 20:30DevSecOps DevSecOpsDinis Cruz , Didar Gelici , Ben Schofield , Nick Drage , Wallaby Curtisdiniscruz didargelici nickdrage Wallaby Curtis@DinisCruz @DGelici @SonOfSunTzu Wallaby Curtiscreate tweet
70Using Open Source AppMap for Runtime Security AnalysisTue16:00 - 17:00DevSecOps DevSecOpsPete Cheslockpetecheslock@petecheslockcreate tweet
71Why you don't need to be technical to get into securityTue18:00 - 19:00 MiscAshley Burkeashburke@burkethelobstercreate tweet
72WordPress: Hacking and SecuringTue19:00 - 20:00DevSecOps DevSecOpsSam Stepanyan@securestep9create tweet

Wed

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1Adversary Simulation: Close the Gaps in Your Security PostureWed18:00 - 19:30Governance GovernanceDon Murdochdon-murdoch-gse-msise-mba-30b1007@BlueTeamHbcreate tweet
2Agile Threat Modeling with Open-Source ToolsWed16:00 - 17:00Threat Modeling Threat ModelingChristian Schneidercschneider4711@cschneider4711create tweet
3Agile Threat Modeling with Open-Source ToolsWed20:30 - 21:30Threat Modeling Threat ModelingChristian Schneidercschneider4711@cschneider4711create tweet
4AI and AppSec: are we finally on the verge of the big breakthrough?Wed19:00 - 20:00DevSecOps DevSecOpsPetra Vukmirovicpetravukmirovic@PetraVuk1311create tweet
5AI ML European regulationWed18:30 - 20:30missingJeff Jockisch , Adam Leon Smith , Federico Marengo@adamleonsmithcreate tweet
6Alert Readiness FrameworkWed16:00 - 17:00Governance GovernanceRui Shantilalcreate tweet
7AMA with Adam ShostackWed20:30 - 21:30Threat Modeling Threat ModelingIzar Tarandach , Adam Shostackizartarandach shostack@izar_t @adamshostackcreate tweet
8AMA with Brook SchoenfieldWed18:00 - 19:30Governance GovernanceBrook S.E. Schoenfield , Izar Tarandachbrookschoenfield izartarandach@brkschoenfield @izar_tcreate tweet
9AMA with Jim ManicoWed20:30 - 22:00DevSecOps DevSecOpsDinis Cruz , Jim Manicodiniscruz jmanico@DinisCruz @manicodecreate tweet
10AMA with Mark CurpheyWed20:00 - 21:00Governance GovernanceDinis Cruz , Mark Curpheydiniscruz curphy@DinisCruz @curpheycreate tweet
11Are our users always smarter than AI?Wed17:00 - 18:00Risk and Governance Risk and GovernanceSarb Sembhisarbsembhi@sarbsembhicreate tweet
12Automating Architectural Risk Analysis with the Open Threat Model formatWed14:00 - 15:00Threat Modeling Threat ModelingFraser Scottcreate tweet
13Building Security ChampionsWed17:00 - 18:00Governance GovernanceTanya Jancatanya-janca@shehackspurplecreate tweet
14CDR API StandardWed16:00 - 17:00CDR CDRDinis Cruz , Elvin Whitediniscruz@DinisCruzcreate tweet
15CDR Engine Standard (Part 1)Wed16:00 - 17:00CDR CDRPaul Burkemisterbee@misterbeecreate tweet
16ChatGPT and GenAI Privacy - Massive Uncertainty and Massive OpportunityWed18:00 - 19:00DevSecOps DevSecOpsDinis Cruz , Sarah Clarkediniscruz@DinisCruzcreate tweet
17ChatGPT for Security Teams - What & HowWed15:00 - 16:00 ChatGPTDinis Cruzdiniscruz@DinisCruzcreate tweet
18Cloud Security Best Practices: Navigating the Evolving Landscape (Panel)Wed15:00 - 16:00 Cloud SecurityDinis Cruzdiniscruz@DinisCruzcreate tweet
19Cloud-Native Security Tools: Enhancing Cloud Protection Capabilities(Panel)Wed15:00 - 16:00DevSecOps DevSecOpsDinis Cruz , Gabriel L. Manor , Or Weis , Oded Ben Daviddiniscruz gmanor orweis odedbendavid@DinisCruz @gemanor @OrWeis @BDOdedcreate tweet
20Conducting effective Table Top Exercises for Cyber Incident Response Practise (Panel)Wed16:00 - 17:00Governance GovernanceDinis Cruz , Venkat Ramshet , Nathan Case , Guy Marongdiniscruz venkat-ramshet nathancase guymarong@DinisCruz @FlexibleIr @karmichand @guy_marongcreate tweet
21Context is king; Prioritization is queen, and CVSS is deadWed15:00 - 16:00DevSecOps DevSecOpsFrancesco Cipollonefracipo@FrankSEC42create tweet
22Cooking the perfect docker container for a react app Part 2Wed15:00 - 16:00DevSecOps DevSecOpsLuis Servin@lfservincreate tweet
23Crowdsourcing Security TalentWed18:00 - 19:00Governance GovernanceDinis Cruz , Ante Gulamdiniscruz agulam@DinisCruz @ante_gulamcreate tweet
24Cyber InsuranceWed15:00 - 16:00Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
25Data Integrity and Information Integrity-they are enterprise not just CISO issuesWed17:00 - 18:00Governance GovernanceSarb Sembhisarbsembhi@sarbsembhicreate tweet
26Finding and Hiring Security Talent (Panel)Wed17:00 - 18:00missingDinis Cruz , Michael Meaney , Eliza-May Austin , Brian Hinojosadiniscruz elizamayaustin@DinisCruz @Eliza_MayAustincreate tweet
27Going Multicloud: Securing Human and Service Identities in AWS vs AzureWed15:00 - 16:00DevSecOps DevSecOpsLior Zatlavilior-zatlavi-10865441@CloudLiocreate tweet
28Hands-on Workshop: Utilize OWASP DSOMM App to Define and Deliver Your Own ProgramWed15:00 - 16:00Governance GovernanceTimo Pagelcreate tweet
29Hiring manager insights to secure your next security role/team memberWed19:00 - 20:00Governance GovernanceMichael Meaneycreate tweet
30How Owasp can help Security Teams - DevSecOpsWed15:00 - 16:00Owasp OwaspDinis Cruz , Sam Stepanyan , Grant Ongersdiniscruz rewtd@DinisCruz @securestep9 @rewtdcreate tweet
31How Owasp can help Security Teams - DevSecOpsWed16:00 - 17:00missingDinis Cruz , Sam Stepanyan , Grant Ongersdiniscruz rewtd@DinisCruz @securestep9 @rewtdcreate tweet
32Improving DevOps using GenAI: Understanding, Visualizing, and OptimizingWed17:00 - 18:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
33In the moment nudges – What? How? Applying nudge theory to awarenessWed16:00 - 17:00Risk and Governance Risk and GovernanceTim Wardtim-ward-cyber@thinkcyberukcreate tweet
34Jim and Dinis Talk AppsecWed20:00 - 21:00DevSecOps DevSecOpsDinis Cruz , Jim Manicodiniscruz jmanico@DinisCruz @manicodecreate tweet
35Kubernetes SecurityWed15:00 - 16:00DevSecOps DevSecOpsUday Thubaticreate tweet
36Linux (kernel) containerization without Docker/runc/OCIWed15:00 - 16:00DevSecOps DevSecOpsDheeraj Madhukardheerajtechnolegends@Dheerajmadhukarcreate tweet
37Live threat modeling of an "online food ordering" systemWed16:00 - 17:00Threat Modeling Threat ModelingLuis Servin@lfservincreate tweet
38Modern Office SpacesWed18:30 - 20:30Governance GovernanceDinis Cruz , Adam Leon Smithdiniscruz @DinisCruz @adamleonsmithcreate tweet
39Moldable development with Glamorous Toolkit Part 2Wed15:00 - 16:00missingDinis Cruz , Tudor Girbadiniscruz girba@DinisCruz @feenkcomcreate tweet
40OSS Semgrep projectWed18:00 - 19:30Semgrep SemgrepDinis Cruzdiniscruz@DinisCruzcreate tweet
41Overview of the new DSOMM ApplicationWed18:00 - 19:00DevSecOps DevSecOpsTimo Pagel , Aryan Prasad@0x41headcreate tweet
42OWASP Security Bot - Hypercharge your Cloud AutomationWed18:00 - 19:30OWASP OWASPDinis Cruzdiniscruz@DinisCruzcreate tweet
43OWASP Wrong Secrets: project goals, under the hood, and where do we go from here?Wed16:00 - 17:00OWASP OWASPBen Dehaan , Jeroen WillemsenBen Dehaan jeroen-willemsenBen Dehaan @commjoeniecreate tweet
44OWASP WrongSecrets: define the future challenges togetherWed15:00 - 16:00Governance GovernanceJeroen Willemsen , Ben De Haanjeroen-willemsen ben-de-haan-65423441@commjoenie @BJFdeHaancreate tweet
45Predicting the rise and fall of an open source projectWed14:00 - 15:00Governance GovernanceEmil Wåreushttps://www.linkedin.com/in/emilwareus/@https://twitter.com/emil_wareuscreate tweet
46Purple Teaming with OWASP PurpleTeamWed20:00 - 21:00DevSecOps DevSecOpsKim Cartercarterkim@binarymistcreate tweet
47Pyroscope internals and Using Pyroscope for real-time view of Cloud/Serverless ApplicationsWed18:30 - 20:30 DevSecopsDmitry FilimonovDmitry FilimonovDmitry Filimonovcreate tweet
48Scaling CyberSecurity teams using GenAIs and FMsWed17:00 - 18:00Governance GovernanceAnte Gulam , Dinis Cruz , Jakub Kaluznyagulam diniscruz jakubkaluzny@ante_gulam @DinisCruz @j_kaluznycreate tweet
49Secure by ScenarioWed18:30 - 20:30Secure by Scenario Secure by ScenarioJames Bore , Didar Gelicijbore didargelici@Coffee_Fueled @DGelicicreate tweet
50Secure By ScenarioWed16:00 - 17:00Secure by Scenario Secure by ScenarioJuan Spinelcreate tweet
51Secure By ScenarioWed16:00 - 17:00Secure by Scenario Secure by ScenarioJuan Spinelcreate tweet
52Secure By ScenarioWed17:00 - 18:00Secure by Scenario Secure by ScenarioJuan Spinelcreate tweet
53Security business enabler: How to align your security program to business goalsWed16:00 - 17:00Governance GovernanceMarius Poskus , Dinis Cruzmarius-poskus-92611b22 diniscruz@Marius_poskus1 @DinisCruzcreate tweet
54Security Design & Guidance at scaleWed18:00 - 19:00Governance GovernanceNielet Dmellonieletdmello@dmellonieletcreate tweet
55Security-Scan your production imagesWed17:00 - 18:00DevSecOps DevSecOpsTimo Pagelcreate tweet
56Taking responsibility for your software - How to simply monitor your solutions for known vulnerabiities and keep your customers informedWed16:00 - 17:00Governance GovernanceJan Thielschercreate tweet
57Testing Ephemeral Kubernetes ApplicationsWed18:30 - 20:30DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
58The Modern Data Broker LandscapeWed20:30 - 22:00Governance GovernanceJeff JockishJeff JockishJeff Jockishcreate tweet
59The Rise of AI Security EngineersWed15:00 - 16:00DevSecOps DevSecOpsStefan Streichsbiersstreichsbier@s_streichsbiercreate tweet
60Threat Model for an Autonomous SystemWed16:00 - 17:00Threat Modeling Threat ModelingAbbas Haidarabbashaidar@AbbasHaidar_create tweet
61Threat Modeling for Schrems IIWed18:30 - 20:30Threat Modeling Threat ModelingDinis Cruz , James Bore , David Clarkediniscruz jbore @DinisCruz @Coffee_Fueled @1DavidClarkecreate tweet
62Threat Modeling for Serverless Architectures: Identifying Risks in a Serverless World (Panel)Wed17:00 - 18:00Threat Modeling Threat ModelingDinis Cruz , Luis Servin , Ayse Vlok , Omer Yarondiniscruz @DinisCruz @lfservincreate tweet
63Threat Modeling KataWed18:00 - 19:00Threat Modeling Threat ModelingLuis Servin@lfservincreate tweet
64Threat Modeling ManifestoWed18:30 - 20:30Threat Modeling Threat ModelingAvi Douglen , Jonathan Marcil , Chris Romeo , Izar Tarandach , Kim Wuyts , Brook S.E. Schoenfield , Matthew Colesavidouglen jonathanmarcil securityjourney izartarandach kwuyts brookschoenfield matthew-coles@sec_tigger @jonathanmarcil @edgeroute @izar_t @Wuytski @brkschoenfield @coles_matthewjcreate tweet
65Turning the Tide : How to convince Senior Management and Ownership to invest in CybersecurityWed17:00 - 18:00Governance GovernanceJames Dellcreate tweet
66Using GenAI to scale CISO's reporting workflowsWed17:00 - 18:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
67Using Jira to Map and Visualise RisksWed16:00 - 18:00Risk and Governance Risk and GovernancePetra Vukmirovic , Abbas Haidar , Chris Holmanpetravukmirovic abbashaidar@PetraVuk1311 @AbbasHaidar_create tweet
68Using OWASP Nettacker for Recon and Vulnerability ScanningWed16:00 - 17:00DevSecOps DevSecOpsSam Stepanyan@securestep9create tweet
69We need second-order thinking in securityWed14:00 - 15:00Governance GovernanceDeepak Prabhakaradeepakp@deepakprabcreate tweet
70When C4s meet Threat ModelsWed16:00 - 17:00Threat Modeling Threat ModelingMarios Clark , Ahmed Mohamed , Petra Vukmirovicmarios-clark me2resh petravukmirovic@n3tw0rks3c @me2resh @PetraVuk1311create tweet

Thu

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1A call for MetricsThu15:00 - 16:00DevSecOps DevSecOpsTimo Pagel , Lars Hermerschmidt , Benjamin TrappBenjamin Trapp@bob5ec Benjamin Trappcreate tweet
2A Cyber Security Roadmap: How To?Thu16:00 - 17:00Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
3AMA with Gary McGrawThu20:00 - 21:00Governance GovernanceIzar Tarandach , Gary McGrawizartarandach @izar_t @cigitalgemcreate tweet
4AMA with Simon WardleyThu10:30 - 12:00Wardley Maps Wardley MapsDinis Cruz , Simon Wardleydiniscruz @DinisCruz @swardleycreate tweet
5An Interactive Session on Teamwork and Collaboration ToolsThu18:00 - 19:00Governance GovernanceDr Daniel Shore , Zachary Broomfieldcreate tweet
6Anticipating the Future: Strengthening App Security through Developer-Centric ForesightThu16:00 - 17:00DevSecOps DevSecOpsJeremy Treadwelljeremytreadwell@Jtread0000create tweet
7AppSec Trending & recommendations:Fixing Security in Cloud & AppsecThu16:00 - 17:00DevSecOps DevSecOpsFrancesco Cipollonefracipo@FrankSEC42create tweet
8Automation and scale with OWASP ZAPThu16:00 - 17:00DevSecOps DevSecOpsTiago Mendotiagomendo@tmendocreate tweet
9Bakeoff - Anti-virus vs CDR vs SandboxingThu17:00 - 18:00 Content Disarm & ReconstructionPaul Burkemisterbee@misterbeecreate tweet
10Beat Alert Fatigue with Cyber Asset Relationship GraphsThu18:00 - 19:30DevSecOps DevSecOpsJasmine Henryjasminehenry10@jasminehenry10create tweet
11Build state of the art SOC with Mitre AttackThu17:00 - 18:00Governance GovernanceMarius Poskusmarius-poskus-92611b22@Marius_poskus1create tweet
12CDR Engine Standard (Part 2)Thu16:00 - 17:00CDR CDRPaul Burkemisterbee@misterbeecreate tweet
13Championing Security: Scaling Security At Every LevelThu18:00 - 19:00Governance GovernanceDwayne McDanieldwaynemcdaniel@mcdwaynecreate tweet
14ChatGPT impact on Cyber and Application Security (Panel)Thu15:00 - 16:00missingDinis Cruz , Nathan Casediniscruz nathancase@DinisCruz @karmichandcreate tweet
15Combatting Adversarial AI: The Role of CISOs, CTOs and the Top Management in Defending Against AI-Powered Cyberattacks(Panel)Thu17:00 - 18:00Governance GovernanceDinis Cruz , Alan Jenkins , Omer Yarondiniscruz alanjenkins@DinisCruz @TheCybrSecNavcreate tweet
16Cooking the perfect docker container for a react appThu15:00 - 16:00Kubernetes KubernetesLuis Servin@lfservincreate tweet
17Creating the GenAI Athena Bot from the theCyberboardroom.comThu18:00 - 19:00DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
18Defense in Depth Layers: Practical Security for LLMs on Google CloudThu16:00 - 17:00Governance GovernanceAlexander MeissnerAlexander MeissnerAlexander Meissnercreate tweet
19DevSecOps for Modern Identity and Access ManagementThu15:00 - 16:00DevSecOps DevSecOpsOr Weis , Barak Schoster Goihman , Dinis Cruz , Marius Poskusorweis barakschoster diniscruz marius-poskus-92611b22@OrWeis @BarakSchoster @DinisCruz @Marius_poskus1create tweet
20Distroless ContainersThu17:00 - 18:00Owasp OwaspTimo Pagelcreate tweet
21Docker For Security ProfessionalsThu15:00 - 16:00DevSecOps DevSecOpsRakesh Elamaranrakeshelamaran98@rakeshoffclcreate tweet
22DSOMM News and Belts-WorkshopThu17:00 - 18:00DevSecOps DevSecOpsTimo Pagelcreate tweet
23Fundamentals of Cloud Security, Threat Identification, AWS ServicesThu14:00 - 15:00DevSecOps DevSecOpsRakesh Elamaranrakeshelamaran98@rakeshoffclcreate tweet
24How to become a cyber security professional? (i.e. where to start?)Thu19:00 - 20:00 Education and TrainingDinis Cruzdiniscruz@DinisCruzcreate tweet
25Introduction into OWASP DSOMMThu17:00 - 18:00missingTimo Pagelcreate tweet
26Learn Threat Modeling using the amazing OSS resourcesThu18:00 - 19:30Threat Modeling Threat ModelingDinis Cruzdiniscruz@DinisCruzcreate tweet
27Living off the Land & Fileless Attacks - Move Beyond the "Known Bad"Thu18:00 - 19:00DevSecOps DevSecOpsCeline Pypaert , Craig Gilliver , Pages(1) , [Éireann Leverett] , Pages(1)celine-cp Craig Gilliver Pages(1) [Éireann Leverett] Pages(1)@_queuebits Craig Gilliver Pages(1) [Éireann Leverett] Pages(1)create tweet
28Low-code access control: Making the complex world of permissions approachable to everyoneThu15:00 - 16:00DevSecOps DevSecOpsFilip Grebowskideveloperfilip@DeveloperFilipcreate tweet
29Making ASVS truly yoursThu15:00 - 16:00OWASP OWASPLuis Servin@lfservincreate tweet
30Maturity Mapping: Contextualise change and learningThu18:30 - 20:30Wardley Maps Wardley MapsChris McDermott@chrisvmcdcreate tweet
31Micro, Mid-Range, Macro - How Gen AI Risk Breaks UsThu16:00 - 17:00Governance GovernanceSarah Clarke , Mitch Cohen , Nick Dragenickdrage@SonOfSunTzucreate tweet
32OSS Threat Modeling and Moldable Development ProjectsThu18:00 - 19:30Threat Modeling Threat ModelingDinis Cruz , Tudor Girbadiniscruz girba@DinisCruz @feenkcomcreate tweet
33OWASP DSOMM Enhancement WorkshopThu18:30 - 20:30DevSecOps DevSecOpsTimo Pagelcreate tweet
34Positive Security models and Rebuilding into a "Known Good" stateThu16:00 - 17:00CDR CDRDinis Cruzdiniscruz@DinisCruzcreate tweet
35Product Permissions - Common Pitfalls and How Not to Fall For ThemThu15:00 - 16:00Governance GovernanceOr Weisorweis@OrWeiscreate tweet
36Ransomware Resilience: Strategies for Prevention and Recovery (Panel)Thu15:00 - 16:00DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
37Rise of Automotive Attacks (Panel Discussion)Thu15:00 - 16:00Governance GovernanceAbbas Haidar , Dinis Cruzabbashaidar diniscruz@AbbasHaidar_ @DinisCruzcreate tweet
38Risk Acceptance and OISRU (Panel)Thu15:00 - 16:00Risk and Governance Risk and GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
39Risk treatment planning in modern tech space (Panel)Thu18:00 - 19:00Governance GovernanceDinis Cruz , Marius Poskus , Izar Tarandachdiniscruz marius-poskus-92611b22 izartarandach@DinisCruz @Marius_poskus1 @izar_tcreate tweet
40Scaling Your Security Program with SemgrepThu17:00 - 19:00DevSecOps DevSecOpsClint Gibler@clintgiblercreate tweet
41Schrems II - Finding workable solutionsThu18:30 - 20:30Schrems II Schrems IIDinis Cruz , James Bore , David Clarke , Adam Leon Smith , Carey Lening , Mark Potkewitzdiniscruz jbore potkewitz@DinisCruz @Coffee_Fueled @1DavidClarke @adamleonsmith @potkewitzcreate tweet
42Secure By ScenarioThu18:30 - 20:30Secure By Scenario Secure By ScenarioJames Borejbore@Coffee_Fueledcreate tweet
43Security Labels & Schrems IIThu18:30 - 20:30Security Labels Security LabelsDinis Cruz , James Bore , David Clarke , Adam Leon Smithdiniscruz jbore @DinisCruz @Coffee_Fueled @1DavidClarke @adamleonsmithcreate tweet
44SOC2 Certification for SaaS companiesThu15:00 - 16:00Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
45Sonar Cube Integrations with GitHubThu16:00 - 17:00DevSecOps DevSecOpsPetra Vukmirovic , Jameel Nabbopetravukmirovic @PetraVuk1311 @jameel_nabbocreate tweet
46Spreading security across the SDLC (with semgrep and other tools)Thu18:30 - 20:30DevSecOps DevSecOpsJohn Melton@_jtmeltoncreate tweet
47Stories of Female empowerment in Cyber SecurityThu17:00 - 18:00Governance GovernanceAshley Burke , Taylor Hendrickson , [Shailynn Hacker] , [Kasia Cichon]ashburke Taylor Hendrickson [Shailynn Hacker] [Kasia Cichon]@burkethelobster Taylor Hendrickson [Shailynn Hacker] [Kasia Cichon]create tweet
48Technical Leadership and InfluenceThu18:00 - 19:30Governance GovernanceBrook S.E. Schoenfieldbrookschoenfield@brkschoenfieldcreate tweet
49Technics to limit hallucinations when using a LLM solution like ChatGPTThu17:00 - 18:00Governance GovernanceMatthew Thompsonthompson-m@thompsonsoncreate tweet
50The challenge of auditing smart contract audit, especially ones with more advanced cryptographic primitives such as ZKP or MPCThu16:00 - 17:00Governance GovernanceAnish Mohammedanishmohammed@anishmohammedcreate tweet
51The Challenges With DNS SecurityThu14:00 - 15:00Governance GovernanceJude Pereira , Dinis Cruzdiniscruz@DinisCruzcreate tweet
52The OWASP Top Ten 2021 ReleaseThu20:30 - 21:30OWASP OWASPJim Manicojmanico@manicodecreate tweet
53The RATs and CATs of Risk - Graph based Risk FrameworkThu16:00 - 17:00Governance GovernancePetra Vukmirovic , Abbas Haidar , Chris Holmanpetravukmirovic abbashaidar@PetraVuk1311 @AbbasHaidar_create tweet
54Threat Modeling Kata IVThu16:00 - 17:00Threat Modeling Threat ModelingLuis Servin@lfservincreate tweet
55Threat Modeling Kata Part 3Thu15:00 - 16:00Threat Modeling Threat ModelingLuis Servin@lfservincreate tweet
56Threat Modeling Using Glamorous ToolkitThu15:00 - 16:00Threat Modeling Threat ModelingTudor Girba , Dinis Cruzgirba diniscruz@feenkcom @DinisCruzcreate tweet
57Using DataDog for Incident Response (Panel)Thu15:00 - 16:00missingNathan Case , Laura de Vesine , Dinis Cruznathancase diniscruz@karmichand @DinisCruzcreate tweet
58Using Domain Specific Languages (DSL) for testingThu15:00 - 16:00DevSecOps DevSecOpsPandy Knight@AutomationPandacreate tweet
59Using Elastic for Incident Response (Panel)Thu17:00 - 18:00missingDinis Cruz , Eliza-May Austindiniscruz elizamayaustin@DinisCruz @Eliza_MayAustincreate tweet
60Using GenAI to Create Personalized Cybersecurity News FeedsThu16:00 - 17:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
61Using Presentations instead of CVs and Creating Diverse Security TeamsThu16:00 - 17:00Governance GovernanceAlex Emmerson , Dinis Cruz , Pages(1) , Pages(1)Alex Emmerson diniscruz Pages(1) Pages(1)Alex Emmerson @DinisCruz Pages(1) Pages(1)create tweet
62Using Splunk for Incident Response (Panel)Thu16:00 - 17:00DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
63Why Wardley Maps changed how I thinkThu18:00 - 19:00Wardley Maps Wardley MapsDinis Cruzdiniscruz@DinisCruzcreate tweet
64Workshop on creating C# Tools using the Owasp O2 PlatformThu18:30 - 20:30missingDinis Cruzdiniscruz@DinisCruzcreate tweet
65Yor:Automated IaC tag and traceThu16:00 - 17:00DevSecOps DevSecOpsStephen Giguerestevegiguere@StephenGiguerecreate tweet
66Zero Trust Architecture: Strengthening Cloud Security Posture (Panel)Thu17:00 - 18:00Governance GovernanceDinis Cruz , Nathan Case , Ogechukwu Okonor , Gabriel L. Manor , Or Weis , Oded Ben David , Maciej Owsianydiniscruz nathancase gmanor orweis odedbendavid@DinisCruz @karmichand @gemanor @OrWeis @BDOdedcreate tweet
67Zero Trust Database Access Using OpenZiti and JDBCThu17:00 - 18:00DevSecOps DevSecOpsMarcos Schejtmancreate tweet
68Zero trust in distributed media workflows for HollywoodThu15:00 - 16:00Governance GovernanceBen Schofieldcreate tweet

Fri

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1AI Agents for Cyber Threat IntelligenceFri15:00 - 16:00Threat Modeling Threat ModelingMatthew Thompsonthompson-m@thompsonsoncreate tweet
2ASVS User Stories creationFri16:00 - 18:00Owasp OwaspMario Plattcreate tweet
3ASVS User Stories creationFri17:00 - 18:00Owasp OwaspMario Plattcreate tweet
4ASVS User Stories creationFri16:00 - 17:00Owasp OwaspMario Plattcreate tweet
5ASVS User Stories creation - Part 6Fri16:00 - 18:00Owasp OwaspMario Plattcreate tweet
6ASVS User Stories creation - Part 7Fri16:00 - 18:00Owasp OwaspMario Plattcreate tweet
7ASVS User Stories creation - Part 8Fri16:00 - 18:00OWASP OWASPMario Plattcreate tweet
8ASVS User Stories creation - Part 9Fri16:00 - 18:00OWASP OWASPMario Plattcreate tweet
9ASVS User Stories creation (part 1)Fri16:00 - 17:00missingMario Plattcreate tweet
10ASVS User Stories creation (part 2)Fri17:00 - 18:00missingMario Plattcreate tweet
11Awards and Networking / drinks timeFrimissing SocialDinis Cruz , Didar Gelici , TBCdiniscruz didargelici TBC@DinisCruz @DGelici TBCcreate tweet
12AWS Security Hub (Panel)Fri17:00 - 18:00DevSecOps DevSecOpsDinis Cruz , Ayse Vlok , Rakesh Elamaran , Ola Oladapodiniscruz rakeshelamaran98 Ola Oladapo@DinisCruz @rakeshoffcl Ola Oladapocreate tweet
13Blockchain and its SecurityFri15:00 - 16:00 MiscAnish Mohammed , Chenxi Wang , Dinis Cruz , Zenobia Godschalk , James Hookeranishmohammed chenxiwang88 diniscruz zenobiaaustingodschalk James Hooker@anishmohammed @chenxiwang @DinisCruz @ZenobiaZAG James Hookercreate tweet
14Bridging the skill gap and hiring challenges in cyberFri14:00 - 15:15Governance GovernancePetra Vukmirovic , Didar Gelici , Marios Clark , Manos Skalidis , Dinis Cruzpetravukmirovic didargelici marios-clark emanouilskalidis diniscruz@PetraVuk1311 @DGelici @n3tw0rks3c @MSkalidis @DinisCruzcreate tweet
15CDC - Collective Defence ClustersFri17:00 - 18:00Governance GovernanceDinis Cruz , Ante Gulamdiniscruz agulam@DinisCruz @ante_gulamcreate tweet
16Check out their (lateral) moves! The importance of blast radius in DevSecOpsFri15:00 - 16:00DevSecOps DevSecOpsMatt Johnsonmattjohnsonuk@MattdashJcreate tweet
17Cloud PenTesting Concepts , CloudGoat Walkthrough , Securing Cloud EndpointsFri14:00 - 15:00 Cloud-SecurityRakesh Elamaranrakeshelamaran98@rakeshoffclcreate tweet
18Creating Secure Builds of ContainersFri16:00 - 17:00DevSecOps DevSecOpsPetra Vukmirovic , Michael Hidalgopetravukmirovic@PetraVuk1311create tweet
19DATA Driven approach on vulnerabilities Appsec vs Infra (Panel)Fri17:00 - 18:00Governance GovernanceFrancesco Cipollone , Jay Jacobs , John Kinsella , Mike Shema , Pages(1) , Pages(1)fracipo Mike Shema Pages(1) Pages(1)@FrankSEC42 Mike Shema Pages(1) Pages(1)create tweet
20Developer Driven Security in high-growth environmentsFri18:00 - 19:00Governance GovernanceJakub Kaluznyjakubkaluzny@j_kaluznycreate tweet
21DevSecOps Maturity Model UpdatesFri15:00 - 16:00DevSecOps DevSecOpsTimo Pagel , Prakarsh Guptaprakarshgupta@prakkarshhcreate tweet
22Embrace Secure Defaults, Block Anti-patterns, and Kill Bug Classes with SemgrepFri18:30 - 20:30DevSecOps DevSecOpsClint Gibler@clintgiblercreate tweet
23Emerging Roles in Cybersecurity: Adapting Recruitment Strategies(Panel)Fri16:00 - 17:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
24Ethical Hacking Challenges: Evaluating Practical Skills in Selection Processes (PanelFri17:00 - 18:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
25GitHub Security Tools (Panel)Fri15:00 - 16:00missingDinis Cruz , Eliza-May Austin , Chris Reddington , Michael Meaneydiniscruz elizamayaustin chrisreddington@DinisCruz @Eliza_MayAustin @reddobowencreate tweet
26GitLab Security Tools (Panel)Fri16:00 - 17:00missingDinis Cruzdiniscruz@DinisCruzcreate tweet
27Hack your own app!Fri18:00 - 19:30DevSecOps DevSecOpsAkira Brandakirabrand@theakiraticreate tweet
28Hacking threat modelingFri16:00 - 17:00Threat Modeling Threat ModelingLuis Servin@lfservincreate tweet
29How can we make Grafana a great open source security tool?Fri16:00 - 17:00DevSecOps DevSecOpsDinis Cruz , Thomas Owendiniscruz thomas-rhys-owen@DinisCruz @TomSionCaticreate tweet
30How do male and female voices project authority in CyberFri19:15 - 20:30Governance GovernanceDanusia Rolewicz , Didar Gelici , Alan Jenkins , Ayse Vlok , Mario Plattdidargelici alanjenkins@DGelici @TheCybrSecNavcreate tweet
31How to overcome DNS security threatsFri15:00 - 16:00Governance GovernanceOsman Karancreate tweet
32How Variant Analysis and CodeQL helped secure the fight against COVID-19Fri16:00 - 17:00DevSecOps DevSecOpsAlvaro Muñoz@pwntestercreate tweet
33Ideas for Graph DBs like Neo4jFri17:00 - 18:00Governance GovernanceDinis Cruz , David Fauth , Dave Voutila , Irene Michlindiniscruz david-fauth-84a4958 davevoutila irene221b@DinisCruz @davefauth @voutilad @IreneMichlincreate tweet
34Let’s go on a DATA with vulnerabilitiesFri16:00 - 17:00Governance GovernanceFrancesco Cipollonefracipo@FrankSEC42create tweet
35Leveraging Artificial Intelligence and Machine Learning in Recruitment(Panel)Fri15:00 - 16:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
36Machine Learning in SemGrep: Leveraging AI for Enhanced Static Analysis(Panel)Fri15:00 - 16:00 SemGrepDinis Cruzdiniscruz@DinisCruzcreate tweet
37Mentoring and it's challenges in Cyber SecurityFri15:30 - 16:45Governance GovernancePetra Vukmirovic , Mario Platt , Marios Clark , Manos Skalidis , James Bore , Dinis Cruzpetravukmirovic marios-clark emanouilskalidis jbore diniscruz@PetraVuk1311 @n3tw0rks3c @MSkalidis @Coffee_Fueled @DinisCruzcreate tweet
38Moldable development with Glamorous Toolkit Part 3Fri16:00 - 17:00missingDinis Cruz , Tudor Girbadiniscruz girba@DinisCruz @feenkcomcreate tweet
39Open Security Control Testing at ScaleFri16:00 - 17:00DevSecOps DevSecOpsLuis Saizlsaiz@lsaizcreate tweet
40Open Security Summit Awards and plans for 2023Fri17:00 - 18:00missingDinis Cruzdiniscruz@DinisCruzcreate tweet
41Open Security Summit Membership AwardsFri18:00 - 19:30missingDinis Cruzdiniscruz@DinisCruzcreate tweet
42OSS - Celebrating the Community and plans for 2022Fri18:00 - 19:30missingDinis Cruzdiniscruz@DinisCruzcreate tweet
43OSS OWASP ProjectFri18:00 - 19:30OWASP OWASPDinis Cruzdiniscruz@DinisCruzcreate tweet
44Owasp O2 Platform tools you can use todayFri18:30 - 20:30missingDinis Cruzdiniscruz@DinisCruzcreate tweet
45Protect Your Application, Not Just the Network. Add Zero Trust Superpowers to Your Critical Applications and SystemsFri18:00 - 19:00DevSecOps DevSecOpsClint Dovholukclint-dovholuk@OpenZiitcreate tweet
46Reciprocity: Tales of an Anthropologist in CybersecurityFri10:30 - 12:00Governance GovernanceLianne Potterliannep@anthrosecuristcreate tweet
47Resilience Engineering, Safety Science and Systems thinking - new tools for the complex worldFri17:45 - 19:00Governance GovernanceMario Platt , Petra Vukmirovic , Aaron Rinehart , Glenn Wilson , Danusia Rolewicz , Sanna Nissinenpetravukmirovic aaronsrinehart glennwilson@PetraVuk1311 @aaronrinehart @glenndynaminetcreate tweet
48Scaling Incident Response using Jira, Jupyter and GSuiteFri15:00 - 16:00DevSecOps DevSecOpsLuke Robbertse , Abbas Haidar , Petra Vukmirovicluke-robbertse-04116abb abbashaidar petravukmirovic@LukeRobbertse @AbbasHaidar_ @PetraVuk1311create tweet
49Secure By ScenarioFri18:30 - 20:30Secure by Scenario Secure by ScenarioJuan Spinelcreate tweet
50Securing CI/CD runners through eBPF agentFri16:00 - 17:00DevSecOps DevSecOpsMert Coskuner , Cenk Kalpakoglucenk-kalpakoglu@cnkk6create tweet
51Security on autonomous systems - a long way to goFri18:00 - 19:30Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
52Security Vendors - Operating ModelFri15:00 - 16:00missingDinis Cruz , Nick Harrisdiniscruz@DinisCruzcreate tweet
53Social Engineering Attacks: Strengthening Human Firewall(Panel)Fri15:00 - 16:00Secure by Scenario Secure by ScenarioDinis Cruzdiniscruz@DinisCruzcreate tweet
54Successes and Failures at Security TrainingFri19:00 - 20:00Governance GovernanceIzar Tarandach , Chris Romeo , Dinis Cruzizartarandach securityjourney diniscruz@izar_t @edgeroute @DinisCruzcreate tweet
55Threat Modeling Glasswall Cloud SDKFri15:00 - 16:00Threat Modeling Threat ModelingDinis Cruz , Petra Vukmirovic , Chris Holman , Abbas Haidardiniscruz petravukmirovic abbashaidar@DinisCruz @PetraVuk1311 @AbbasHaidar_create tweet
56Threat Modeling Glasswall Folder-to-Folder PluginFri17:00 - 18:00Threat Modeling Threat ModelingDinis Cruz , Petra Vukmirovic , Chris Holman , Abbas Haidardiniscruz petravukmirovic abbashaidar@DinisCruz @PetraVuk1311 @AbbasHaidar_create tweet
57Threat Modelling as Code and Threat Modelling ChallengesFri15:00 - 16:00Threat Modeling Threat ModelingPetra Vukmirovic , Marios Clarkpetravukmirovic marios-clark@PetraVuk1311 @n3tw0rks3ccreate tweet
58Use GenAI to Understand and Transform Content, Not to Create ItFri16:00 - 17:00 GenAIDinis Cruzdiniscruz@DinisCruzcreate tweet
59Using AppMap runtime code visualizations to scout for security flawsFri15:00 - 16:00DevSecOps DevSecOpsElizabeth Lawler , Kevin Gilpinelizabethlawler kegilpin/@ElizabethLawler @kegilpincreate tweet
60Using Teleport to Secure SSH and Kubernetes AccessFri14:00 - 15:00DevSecOps DevSecOpsSakshyam Shahsshahconnects@sshahtweetscreate tweet
61Vendor Security Management using JiraFri18:30 - 20:30Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
62Virtual PubFri18:30 - 20:30 MiscellenousDinis Cruz , Didar Gelicidiniscruz didargelici@DinisCruz @DGelicicreate tweet
63Who Goes There? Actively Detecting Intruders With Cyber Deception ToolsFri15:00 - 16:00Governance GovernanceDwayne McDanieldwaynemcdaniel@mcdwaynecreate tweet
64Women kick off in CybersecurityFri16:00 - 17:00Governance GovernanceKiran Gandhi , Surbhi Guptacreate tweet