Sessions Social Media


Admin | Sessions Social Media

This page will help to reach out to organisers using Social media

Mon

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1A perspective on automating 3rd party risk assessment. How to free up your staff, and improve speed by automaton with guardrails.Mon15:00 - 16:00missingOwen JohnOwen JohnOwen Johncreate tweet
2AMA with OWASP BoardMon16:00 - 17:00Owasp OwaspDinis Cruz , Grant Ongers , Andrew van der Stock , Vandana Vermadiniscruz rewtd vanderaj @DinisCruz @rewtd @vanderaj @InfosecVandanacreate tweet
3Automating SOC2 using JiraMon20:30 - 22:00missingDinis Cruz , Luke Robbertse , Abbas Haidardiniscruz luke-robbertse-04116abb abbashaidar@DinisCruz @LukeRobbertse @AbbasHaidar_create tweet
4Beginners Threat ModelingMon18:30 - 20:30Threat Modeling Threat ModelingJames Borejbore@Coffee_Fueledcreate tweet
5Challenges in IoT security: from infinite recommendations to a plethora of implementationsMon15:00 - 16:00Governance GovernanceNicolas Boeckhhttps://www.linkedin.com/in/nicolas-boeckh/@https://twitter.com/AtomicNicoscreate tweet
6For bugs start with a passing test (and 99% code coverage)Mon17:00 - 18:00Owasp OwaspDinis Cruzdiniscruz@DinisCruzcreate tweet
7Keynote - Open Security Summit 2020MonmissingKeynotes KeynotesOpen Security Summitcreate tweet
8Playing at Security: Designing, building, and running tabletop scenarios for fail-safe incident handling and incident response trainingMon18:30 - 20:30Secure by Scenario Secure by ScenarioJames Borejbore@Coffee_Fueledcreate tweet
9Remote Threat ModelingMon15:00 - 16:00Threat Modeling Threat ModelingDidar Gelicididargelici@DGelicicreate tweet
10Scaling Threat Models visualisations using PlantUML and VisJSMon15:00 - 16:00DevSecOps DevSecOpsDinis Cruz , Petra Vukmirovic , M. Lucía Pappaterra , Chris Diao , Lwasampijja Baker , Abbas Haidardiniscruz petravukmirovic abbashaidar@DinisCruz @PetraVuk1311 @AbbasHaidar_create tweet
11Schrems II - Transfer risk triage and other adventures in scopingMon18:30 - 20:30Schrems II Schrems IISarah Clarkecreate tweet
12SDA SE Cluster Scanner is going Open SourceMon16:00 - 17:00DevSecOps DevSecOpsTimo Pagelcreate tweet
13Secure Access to Kubernetes pods using teleportMon17:00 - 18:00DevSecOps DevSecOpsTBDTBDTBDcreate tweet
14Secure by Scenario - Data breach at the North PoleMon18:30 - 20:30Secure by Scenario Secure by ScenarioJames Borejbore@Coffee_Fueledcreate tweet
15Security-Scan your production imagesMon17:00 - 18:00DevSecOps DevSecOpsTimo Pagelcreate tweet
16Threat Modeling PlaybookMon18:30 - 20:30Threat Modeling Threat ModelingSebastien Deleersnyder , Didar Gelicididargelici@sebadele @DGelicicreate tweet
17Threats categorization, pitfalls, different ways of applying it in practiseMon18:30 - 20:30Threat Modeling Threat ModelingJames Borejbore@Coffee_Fueledcreate tweet
18Using VPC Flows to monitor EC2 TrafficMon16:00 - 17:00DevSecOps DevSecOpsMichael Hidalgocreate tweet
19Wardley Maps and services model at GlasswallMon16:00 - 17:00Wardley Maps Wardley MapsSteve Purkis@spurkiscreate tweet
20What to do in preparation for a Threat ModelMon16:00 - 17:00Governance GovernancePetra Vukmirovic , Abbas Haidar , Chris Holmanpetravukmirovic abbashaidar@PetraVuk1311 @AbbasHaidar_create tweet

Tue

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1AMA with Jeremiah GrossmanTue20:30 - 22:00DevSecOps DevSecOpsDinis Cruz , Jeremiah Grossmandiniscruz grossmanjeremiah@DinisCruz @jeremiahgcreate tweet
2CISO RoundtableTue15:00 - 16:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
3ClusterScanner DemonstrationTue17:00 - 18:00DevSecOps DevSecOpsTimo Pagelcreate tweet
4Compliant Kubernetes - Case StudyTue16:00 - 17:00DevSecOps DevSecOpsJakub Krzywda , Cristian Kleincreate tweet
5Creating 1 million kubernetes pods - Lessons learnedTue17:00 - 18:00DevSecOps DevSecOpsMatthew Pigram , Dharam Patelcreate tweet
6Encrypted Calendars - the need and consequencesTue18:30 - 20:30Governance GovernanceMark Potkewitzpotkewitz@potkewitzcreate tweet
7Graph Based Vulnerability ManagementTue15:00 - 16:00Governance GovernanceChris Holman , Petra Vukmirovicpetravukmirovic@PetraVuk1311create tweet
8How Owasp can help Security Teams - Guides and Testing ToolsTue15:00 - 16:00Owasp OwaspDinis Cruz , Sam Stepanyan , Grant Ongers , Vandana Vermadiniscruz rewtd @DinisCruz @securestep9 @rewtd @InfosecVandanacreate tweet
9How Owasp can help Security Teams - Guides and Testing ToolsTue16:00 - 17:00Owasp OwaspDinis Cruz , Sam Stepanyan , Grant Ongers , Vandana Vermadiniscruz rewtd @DinisCruz @securestep9 @rewtd @InfosecVandanacreate tweet
10Managing projects using Github Issues and ZenHubTue17:00 - 18:00Owasp OwaspGeorgina Gonzalezcreate tweet
11Mitigating Risks Through Open-Source Bitcoin TracingTue18:30 - 20:30DevSecOps DevSecOpsMargaux EckleMargaux EckleMargaux Ecklecreate tweet
12Moldable development with Glamorous Toolkit Part 1Tue16:00 - 17:00missingDinis Cruz , Tudor Girbadiniscruz https://www.linkedin.com/in/girba/@DinisCruz @feenkcomcreate tweet
13Refresher on Security LabelsTue18:30 - 20:30Security Labels Security LabelsDinis Cruz , James Bore , David Clarke , Adam Leon Smithdiniscruz jbore @DinisCruz @Coffee_Fueled @1DavidClarke @adamleonsmithcreate tweet
14Rules & Recommendations: Are we pushing our new IoT device out correctly?Tue16:00 - 17:00Governance GovernanceNicolas Boeckhhttps://www.linkedin.com/in/nicolas-boeckh/@https://twitter.com/AtomicNicoscreate tweet
15Scaling Kubernetes - One Pod per fileTue18:30 - 20:30DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
16Schrems II - Finding workable solutionsTue18:30 - 20:30Schrems II Schrems IIDinis Cruz , James Bore , David Clarke , Adam Leon Smith , Carey Lening , Mark Potkewitzdiniscruz jbore potkewitz@DinisCruz @Coffee_Fueled @1DavidClarke @adamleonsmith @potkewitzcreate tweet
17Threat Modeling Glasswall DesktopTue16:00 - 17:00Threat Modeling Threat ModelingMudit Gupta@Mudit__Guptacreate tweet
18Using Kubernetes to create a scalable Security Proxy solutionTue18:30 - 20:30DevSecOps DevSecOpsDinis Cruz , Didar Gelici , Ben Schofield , [Nick Drage] , [Wallaby Curtis]diniscruz didargelici Ben Schofield [Nick Drage] [Wallaby Curtis]@DinisCruz @DGelici Ben Schofield [Nick Drage] [Wallaby Curtis]create tweet

Wed

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1Agile Threat Modeling with Open-Source ToolsWed16:00 - 17:00Threat Modeling Threat ModelingChristian Schneider@https://twitter.com/cschneider4711create tweet
2AI ML European regulationWed18:30 - 20:30missingJeff Jockisch , Adam Leon Smith , Federico Marengo@adamleonsmithcreate tweet
3AMA with Jim ManicoWed20:30 - 22:00DevSecOps DevSecOpsDinis Cruz , Jim Manicodiniscruz @DinisCruz @manicodecreate tweet
4CDR API StandardWed16:00 - 17:00CDR CDRDinis Cruz , Paul Burke , Elvin White , Paul Farringtondiniscruz misterbee misterbee@DinisCruz @misterbee @pfarringtoncreate tweet
5CDR Engine Standard (Part 1)Wed16:00 - 17:00CDR CDRPaul Burkemisterbee@misterbeecreate tweet
6CTO RoundtableWed15:00 - 16:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
7How Owasp can help Security Teams - DevSecOpsWed15:00 - 16:00Owasp OwaspDinis Cruz , Sam Stepanyan , Grant Ongersdiniscruz rewtd@DinisCruz @securestep9 @rewtdcreate tweet
8How Owasp can help Security Teams - DevSecOpsWed16:00 - 17:00Owasp OwaspDinis Cruz , Sam Stepanyan , Grant Ongersdiniscruz rewtd@DinisCruz @securestep9 @rewtdcreate tweet
9Modern Office SpacesWed18:30 - 20:30Governance GovernanceDinis Cruz , Adam Leon Smithdiniscruz @DinisCruz @adamleonsmithcreate tweet
10Moldable development with Glamorous Toolkit Part 2Wed15:00 - 16:00missingDinis Cruz , Tudor Girbadiniscruz https://www.linkedin.com/in/girba/@DinisCruz @feenkcomcreate tweet
11Pyroscope internals and Using Pyroscope for real-time view of Cloud/Serverless ApplicationsWed18:30 - 20:30missingDmitry FilimonovDmitry FilimonovDmitry Filimonovcreate tweet
12Secure By ScenarioWed16:00 - 17:00Secure by Scenario Secure by ScenarioJuan Spinelcreate tweet
13Secure By ScenarioWed16:00 - 17:00Secure by Scenario Secure by ScenarioJuan Spinelcreate tweet
14Secure By ScenarioWed17:00 - 18:00Secure by Scenario Secure by ScenarioJuan Spinelcreate tweet
15Secure by ScenarioWed18:30 - 20:30Secure by Scenario Secure by ScenarioJames Bore , Didar Gelicijbore didargelici@Coffee_Fueled @DGelicicreate tweet
16Testing Ephemeral Kubernetes ApplicationsWed18:30 - 20:30DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
17The Modern Data Broker LandscapeWed20:30 - 22:00Governance GovernanceJeff JockishJeff JockishJeff Jockishcreate tweet
18Threat Modeling for Schrems IIWed18:30 - 20:30Threat Modeling Threat ModelingDinis Cruz , James Bore , David Clarkediniscruz jbore @DinisCruz @Coffee_Fueled @1DavidClarkecreate tweet
19Threat Modeling ManifestoWed18:30 - 20:30Threat Modeling Threat ModelingAvi Douglen , Jonathan Marcil , Chris Romeo , Izar Tarandach , Kim Wuyts , Brook S.E. Schoenfield , Matthew Colesavidouglen jonathanmarcil securityjourney izartarandach kwuyts brookschoenfield matthew-coles@sec_tigger @jonathanmarcil @edgeroute @izar_t @Wuytski @brkschoenfield @coles_matthewjcreate tweet

Thu

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1AMA with Simon WardleyThu10:30 - 12:00Wardley Maps Wardley MapsDinis Cruz , Simon Wardleydiniscruz @DinisCruz @swardleycreate tweet
2Bakeoff - Anti-virus vs CDR vs SandboxingThu17:00 - 18:00Content Disarm & ReconstructionPaul Burkemisterbee@misterbeecreate tweet
3CDR Engine Standard (Part 2)Thu16:00 - 17:00CDR CDRPaul Burkemisterbee@misterbeecreate tweet
4Distroless ContainersThu17:00 - 18:00Owasp OwaspTimo Pagelcreate tweet
5DSOMMThu17:00 - 18:00DevSecOps DevSecOpsTimo Pagelcreate tweet
6Introduction into OWASP DSOMMThu17:00 - 18:00Owasp OwaspTimo Pagelcreate tweet
7Maturity Mapping: Contextualise change and learningThu18:30 - 20:30Wardley Maps Wardley MapsChris McDermott@chrisvmcdcreate tweet
8OWASP DSOMM Enhancement WorkshopThu18:30 - 20:30DevSecOps DevSecOpsTimo Pagelcreate tweet
9Positive Security models and Rebuilding into a "Known Good" stateThu16:00 - 17:00CDR CDRDinis Cruzdiniscruz@DinisCruzcreate tweet
10Scaling Your Security Program with SemgrepThu17:00 - 19:00DevSecOps DevSecOpsClint Gibler@clintgiblercreate tweet
11Schrems II - Finding workable solutionsThu18:30 - 20:30Schrems II Schrems IIDinis Cruz , James Bore , David Clarke , Adam Leon Smith , Carey Lening , Mark Potkewitzdiniscruz jbore potkewitz@DinisCruz @Coffee_Fueled @1DavidClarke @adamleonsmith @potkewitzcreate tweet
12Secure By ScenarioThu18:30 - 20:30Secure By Scenario Secure By ScenarioJames Borejbore@Coffee_Fueledcreate tweet
13Security Labels & Schrems IIThu18:30 - 20:30Security Labels Security LabelsDinis Cruz , James Bore , David Clarke , Adam Leon Smithdiniscruz jbore @DinisCruz @Coffee_Fueled @1DavidClarke @adamleonsmithcreate tweet
14SOC2 Certification for SaaS companiesThu15:00 - 16:00Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
15Sonar Cube Integrations with GitHubThu16:00 - 17:00DevSecOps DevSecOpsPetra Vukmirovic , Jameel Nabbopetravukmirovic @PetraVuk1311 @jameel_nabbocreate tweet
16Spreading security across the SDLC (with semgrep and other tools)Thu18:30 - 20:30DevSecOps DevSecOpsJohn Melton@_jtmeltoncreate tweet
17The RATs and CATs of Risk - Graph based Risk FrameworkThu16:00 - 17:00Governance GovernancePetra Vukmirovic , Abbas Haidar , Chris Holmanpetravukmirovic abbashaidar@PetraVuk1311 @AbbasHaidar_create tweet
18Threat Modeling Using Glamorous ToolkitThu15:00 - 16:00Threat Modeling Threat ModelingTudor Girba , Dinis Cruzhttps://www.linkedin.com/in/girba/ diniscruz@feenkcom @DinisCruzcreate tweet
19Using Domain Specific Languages (DSL) for testingThu15:00 - 16:00missingPandy Knight@AutomationPandacreate tweet
20Workshop on creating C# Tools using the Owasp O2 PlatformThu18:30 - 20:30Owasp OwaspDinis Cruzdiniscruz@DinisCruzcreate tweet
21Yor:Automated IaC tag and traceThu16:00 - 17:00DevSecOps DevSecOpsSteve Giguerehttps://www.linkedin.com/in/stevegiguere/@https://twitter.com/StephenGiguerecreate tweet

Fri

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1ASVS User Stories creationFri16:00 - 18:00Owasp OwaspMario Plattcreate tweet
2ASVS User Stories creationFri17:00 - 18:00Owasp OwaspMario Plattcreate tweet
3ASVS User Stories creationFri16:00 - 17:00Owasp OwaspMario Plattcreate tweet
4ASVS User Stories creation (part 1)Fri16:00 - 17:00Owasp OwaspMario Plattcreate tweet
5ASVS User Stories creation (part 2)Fri17:00 - 18:00Owasp OwaspMario Plattcreate tweet
6ASVS User Stories creation - Part 6Fri16:00 - 18:00Owasp OwaspMario Plattcreate tweet
7ASVS User Stories creation - Part 7Fri16:00 - 18:00Owasp OwaspMario Plattcreate tweet
8Creating Secure Builds of ContainersFri16:00 - 17:00DevSecOps DevSecOpsPetra Vukmirovic , Michael Hidalgopetravukmirovic@PetraVuk1311create tweet
9Embrace Secure Defaults, Block Anti-patterns, and Kill Bug Classes with SemgrepFri18:30 - 20:30DevSecOps DevSecOpsClint Gibler@clintgiblercreate tweet
10How Variant Analysis and CodeQL helped secure the fight against COVID-19Fri16:00 - 17:00DevSecOps DevSecOpsAlvaro Muñoz@pwntestercreate tweet
11Moldable development with Glamorous Toolkit Part 3Fri16:00 - 17:00missingDinis Cruz , Tudor Girbadiniscruz https://www.linkedin.com/in/girba/@DinisCruz @feenkcomcreate tweet
12Owasp O2 Platform tools you can use todayFri18:30 - 20:30Owasp OwaspDinis Cruzdiniscruz@DinisCruzcreate tweet
13Reciprocity: Tales of an Anthropologist in CybersecurityFri10:30 - 12:00Governance GovernanceLianne Potterhttps://www.linkedin.com/in/liannep/@https://twitter.com/anthrosecuristcreate tweet
14Scaling Incident Response using Jira, Jupyter and GSuiteFri15:00 - 16:00DevSecOps DevSecOpsLuke Robbertse , Abbas Haidar , Petra Vukmirovicluke-robbertse-04116abb abbashaidar petravukmirovic@LukeRobbertse @AbbasHaidar_ @PetraVuk1311create tweet
15Secure By ScenarioFri18:30 - 20:30Secure by Scenario Secure by ScenarioJuan Spinelcreate tweet
16Threat Modeling Glasswall Cloud SDKFri15:00 - 16:00Threat Modeling Threat ModelingDinis Cruz , Petra Vukmirovic , Chris Holman , Abbas Haidardiniscruz petravukmirovic abbashaidar@DinisCruz @PetraVuk1311 @AbbasHaidar_create tweet
17Threat Modeling Glasswall Folder-to-Folder PluginFri17:00 - 18:00Threat Modeling Threat ModelingDinis Cruz , Petra Vukmirovic , Chris Holman , Abbas Haidardiniscruz petravukmirovic abbashaidar@DinisCruz @PetraVuk1311 @AbbasHaidar_create tweet
18Vendor Security Management using JiraFri18:30 - 20:30Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
19Virtual PubFri18:30 - 20:30MiscellenousDinis Cruz , Didar Gelicidiniscruz didargelici@DinisCruz @DGelicicreate tweet