Sessions Social Media


Admin | Sessions Social Media

This page will help to reach out to organisers using Social media

Mon

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1A perspective on automating 3rd party risk assessment. How to free up your staff, and improve speed by automaton with guardrails.Mon15:00 - 16:00Governance GovernanceOwen JohnOwen JohnOwen Johncreate tweet
2A workshop on DAST and how to put it into your pipelineMon16:00 - 17:00DevSecOps DevSecOpsTanya Jancatanya-janca@shehackspurplecreate tweet
3Addressing the cyber unemployment crisis; a positive outlookMon15:00 - 16:00Governance GovernanceRichea Perrycreate tweet
4AI-Driven Threat Modelling with STRIDE GPTMon16:00 - 17:00Threat Modeling Threat ModelingMatthew Adamscreate tweet
5AMA with OWASP BoardMon16:00 - 17:00missingVandana Verma , Dinis Cruz , Grant Ongers , Andrew van der Stock , Vandana Verma diniscruz rewtd vanderaj @InfosecVandana @DinisCruz @rewtd @vanderaj @InfosecVandanacreate tweet
6An AppSec guide to practical cryptographyMon18:00 - 19:00DevSecOps DevSecOpsLarkins Carvalholarkinscarvalho@LarkinsCarvalhocreate tweet
7Application Security vulnerabilities - measurements, maturity magic - Vulnerability Framework ProjectMon16:00 - 17:00DevSecOps DevSecOpsFrancesco Cipollonefracipo@FrankSEC42create tweet
8AttackGen: Harnessing Language Models for Cybersecurity SimulationsMon18:00 - 19:00DevSecOps DevSecOpsMatthew Adamscreate tweet
9Automating SOC2 using JiraMon20:30 - 22:00Governance GovernanceDinis Cruz , Luke Robbertse , Abbas Haidardiniscruz luke-robbertse-04116abb abbashaidar@DinisCruz @LukeRobbertse @AbbasHaidar_create tweet
10Beginners Threat ModelingMon18:30 - 20:30Threat Modeling Threat ModelingJames Borejbore@Coffee_Fueledcreate tweet
11Behaviour Change and AwarenessMon18:00 - 19:00Risk and Governance Risk and GovernanceTim Ward , Dinis Cruz , Danusia Rolewicz , Janet Bonar Lawtim-ward-cyber diniscruz@thinkcyberuk @DinisCruzcreate tweet
12Challenges in IoT security: from infinite recommendations to a plethora of implementationsMon15:00 - 16:00Governance GovernanceMaya Boeckhnicolas-boeckh@AtomicNicoscreate tweet
13Creating a Scalable API Test Framework using AWS and ElasticMon18:00 - 19:30DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
14CVE CWE CVSS CWSS where do I look first?Mon16:00 - 18:00Governance GovernanceFrancesco Cipollonefracipo@FrankSEC42create tweet
15Cyber Security Vendor Procurement Model(Panel)Mon18:00 - 19:00Governance GovernanceAnte Gulam , Dinis Cruzagulam diniscruz@ante_gulam @DinisCruzcreate tweet
16Data CultureMon19:00 - 20:00Wardley Maps Wardley MapsDinis Cruz , Tudor Girba , Tariq Rashid , Mark Craddock , Pages(1)diniscruz girba Mark Craddock Pages(1)@DinisCruz @feenkcom @rzeta0 Mark Craddock Pages(1)create tweet
17Dependency Management and Supply Chain SecurityMon15:00 - 16:00Governance GovernanceChristian Köberl@derkoecreate tweet
18DevSecOps beyond CI/CD pipelinesMon20:00 - 21:00DevSecOps DevSecOpsAnna Lezhikovacreate tweet
19Doing Compliance Differently: Policies as Code, Evidence-based compliance through automationMon20:00 - 21:00DevSecOps DevSecOpsLuis Servin@lfservincreate tweet
20For bugs start with a passing test (and 99% code coverage)Mon17:00 - 18:00Owasp OwaspDinis Cruzdiniscruz@DinisCruzcreate tweet
21How to perform threat assessments, the right way!Mon17:00 - 18:00Threat Modeling Threat ModelingSaber Ferjanisaberferjani@cyris360create tweet
22How we build a security automation software utilizing open-source components (Betterscan.io)Mon15:00 - 16:00DevSecOps DevSecOpsMarcin Kozlowskimarcinguy@marcinguycreate tweet
23IoT: pervasive vulnerability, threat landscape and end-usersMon15:00 - 16:00Threat Modeling Threat ModelingMaya Boeckhnicolas-boeckh@AtomicNicoscreate tweet
24Jira Schemas and Workflows for AppSec and Risk ManagementMon18:00 - 19:30Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
25Keynote - Open Security Summit 2020MonmissingKeynotes KeynotesOpen Security Summitcreate tweet
26Kubernetes Clusters Network SecurityMon17:00 - 18:00missingDinis Cruz , Nathan Casediniscruz nathancase@DinisCruz @karmichandcreate tweet
27Lessons learned from trying to create Architecture Diagrams As CodeMon16:00 - 17:00DevSecOps DevSecOpsMartin Obiolsmobiols@olemoudicreate tweet
28Mapping Threat Intelligence: Enhancing Situational Awareness (Panel)Mon16:00 - 17:00Governance GovernanceDinis Cruz , Marius Poskus , Simon Wardleydiniscruz marius-poskus-92611b22 @DinisCruz @Marius_poskus1 @swardleycreate tweet
29Mental Health in Cyber SecurityMon17:00 - 18:00Governance GovernanceSarb Sembhisarbsembhi@sarbsembhicreate tweet
30New OSS ProjectsMon18:00 - 19:30 MiscDinis Cruzdiniscruz@DinisCruzcreate tweet
31Open source modern access controlMon18:00 - 19:30DevSecOps DevSecOpsOr Weisorweis@OrWeiscreate tweet
32Panel - Prioritizing Risks and Vulnerabilities based on ContextMon15:00 - 16:00Risk and Governance Risk and GovernanceDinis Cruz , Petra Vukmirovic , Francesco Cipollonediniscruz petravukmirovic fracipo@DinisCruz @PetraVuk1311 @FrankSEC42create tweet
33Panel - Wardley Maps in Cyber SecurityMon16:00 - 17:00missingDinis Cruz , Simon Wardley , Krzysztof Daniel , Nick Harrisdiniscruz christopherdaniel@DinisCruz @swardley @wardleymapscreate tweet
34Parsec-Hardware security at your fingertipsMon17:00 - 18:00DevSecOps DevSecOpsPaul Howardpaulhoward4@PaulHoward5create tweet
35Playing at Security: Designing, building, and running tabletop scenarios for fail-safe incident handling and incident response trainingMon18:30 - 20:30Secure by Scenario Secure by ScenarioJames Borejbore@Coffee_Fueledcreate tweet
36Privacy-The Challenges in Post Tornado Cash WorldMon17:00 - 18:00DevSecOps DevSecOpsAnish Mohammed , John Marshall , Dinis Cruzanishmohammed marshalljd diniscruz@anishmohammed @_jdmarshall @DinisCruzcreate tweet
37Quantifying Usability In Security Designs and Risk AssessmentsMon18:00 - 19:00Governance GovernanceDinis Cruz , Tariq Rashid , Izar Tarandachdiniscruz izartarandach@DinisCruz @rzeta0 @izar_tcreate tweet
38Remote Threat ModelingMon15:00 - 16:00Threat Modeling Threat ModelingDidar Gelicididargelici@DGelicicreate tweet
39Scaling Threat Models visualisations using PlantUML and VisJSMon15:00 - 16:00DevSecOps DevSecOpsDinis Cruz , Petra Vukmirovic , M. Lucía Pappaterra , Chris Diao , Lwasampijja Baker , Abbas Haidardiniscruz petravukmirovic abbashaidar@DinisCruz @PetraVuk1311 @AbbasHaidar_create tweet
40Schrems II - Transfer risk triage and other adventures in scopingMon18:30 - 20:30Schrems II Schrems IISarah Clarkecreate tweet
41SDA SE Cluster Scanner is going Open SourceMon16:00 - 17:00DevSecOps DevSecOpsTimo Pagelcreate tweet
42Secure by Scenario - Data breach at the North PoleMon18:30 - 20:30Secure by Scenario Secure by ScenarioJames Borejbore@Coffee_Fueledcreate tweet
43Secured Digital WorkspaceMon20:00 - 21:00DevSecOps DevSecOpsJude Pereiracreate tweet
44Shift Smart - risk based approach on appsecMon16:00 - 17:00DevSecOps DevSecOpsFrancesco Cipollonefracipo@FrankSEC42create tweet
45Shift-Right Security: Emphasizing Post-Deployment Monitoring and Response (Panel)Mon15:00 - 16:00DevSecOps DevSecOpsDinis Cruz , Omer Yaron , Marius Poskusdiniscruz marius-poskus-92611b22@DinisCruz @Marius_poskus1create tweet
46Shodan OSINT Automation to Mass Exploitation of VulnerabilitiesMon14:00 - 15:00DevSecOps DevSecOpsDheeraj Madhukardheerajtechnolegends@Dheerajmadhukarcreate tweet
47SOAR - Security Orchestration, Automation, and Response (Panel)Mon17:00 - 18:00DevSecOps DevSecOpsDinis Cruz , Venkat Ramshet , Pratibha Malik , Pages(1)diniscruz venkat-ramshet Pratibha Malik Pages(1)@DinisCruz @FlexibleIr Pratibha Malik Pages(1)create tweet
48Starbase - Graph-based security analysis for everyoneMon15:00 - 16:00DevSecOps DevSecOpsAustin Kelleher , Adam Piersonaustinkelleher@AustinKellehercreate tweet
49Supply Chain Security: Strengthening Resilience Against Third-Party Risks(panel)Mon16:00 - 17:00Governance GovernanceDinis Cruz , Marius Poskusdiniscruz marius-poskus-92611b22@DinisCruz @Marius_poskus1create tweet
50The next Insider Threat isn't your staff!Mon17:00 - 18:00Governance GovernanceSarb Sembhisarbsembhi@sarbsembhicreate tweet
51The Survival Guide to implementing Threat ModelingMon19:00 - 20:00Threat Modeling Threat ModelingMiguel Llamazares , Dave van Steindvstein@Dave_von_Screate tweet
52The Truth about suffering a cyber-attackMon17:00 - 18:00Risk and Governance Risk and GovernanceJames Dellcreate tweet
53The value of CTO/CISOs and how to make it workMon18:00 - 19:00Governance GovernanceDinis Cruz , Mario Platt , Christofer Hoffdiniscruz Christofer Hoff@DinisCruz Christofer Hoffcreate tweet
54Threat Modeling Failure ModesMon17:00 - 18:00Threat Modeling Threat ModelingIzar Tarandachizartarandach@izar_tcreate tweet
55Threat Modeling Kata Part 2Mon17:00 - 18:00Threat Modeling Threat ModelingLuis Servin@lfservincreate tweet
56Threat Modeling PlaybookMon18:30 - 20:30Threat Modeling Threat ModelingSebastien Deleersnyder , Didar Gelici didargelici@sebadele @DGelicicreate tweet
57Threat Modelling Adoption in Disciplines Other Than DevelopmentMon18:00 - 19:00Threat Modeling Threat ModelingMarius Poskus , Dinis Cruzmarius-poskus-92611b22 diniscruz@Marius_poskus1 @DinisCruzcreate tweet
58Threat Modelling as Code v2Mon15:00 - 16:00Threat Modeling Threat ModelingPetra Vukmirovic , Chen Gour-Ariepetravukmirovic@PetraVuk1311create tweet
59Threat Models and Wardley MapsMon18:00 - 19:30Threat Modeling Threat ModelingBrook S.E. Schoenfield , Dave van Stein , Dinis Cruz , Izar Tarandach , Jakub Kaluzny , Krzysztof Danielbrookschoenfield dvstein diniscruz izartarandach jakubkaluzny christopherdaniel@brkschoenfield @Dave_von_S @DinisCruz @izar_t @j_kaluzny @wardleymapscreate tweet
60Threats categorization, pitfalls, different ways of applying it in practiseMon18:30 - 20:30Threat Modeling Threat ModelingJames Borejbore@Coffee_Fueledcreate tweet
61Using VPC Flows to monitor EC2 TrafficMon16:00 - 17:00DevSecOps DevSecOpsMichael Hidalgocreate tweet
62Utilising Security Champions Product TeamsMon15:00 - 16:00Governance GovernanceKimberley Grahamkimberleyhendry@Kimberley_HGcreate tweet
63Wardley Maps and services model at GlasswallMon16:00 - 17:00Wardley Maps Wardley MapsSteve Purkis@spurkiscreate tweet
64Web application's language negotiation in 2023Mon15:00 - 16:00Governance GovernanceAndré Ferreiracreate tweet
65What to do in preparation for a Threat ModelMon16:00 - 17:00Governance GovernancePetra Vukmirovic , Abbas Haidar , Chris Holmanpetravukmirovic abbashaidar@PetraVuk1311 @AbbasHaidar_create tweet
66Women in Cyber Security: Personal experiences and how to be an AllyMon16:00 - 17:00Governance GovernanceAshley Burke , Karla Reffold , Melissa Ryan , Jana Canigliaashburke karlareffold@burkethelobster @karla_reffoldcreate tweet
67Zero Trust Network Access FrameworkMon17:00 - 18:00DevSecOps DevSecOpsJude Pereiracreate tweet

Tue

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1“Shift Left” Isn’t What You ExpectedTue15:00 - 16:00Risk and Governance Risk and GovernanceChen Gour-Ariecreate tweet
2Abuse Tests for DevelopersTue16:00 - 18:00DevSecOps DevSecOpsTimo Pagelcreate tweet
3AMA with Alyssa MillerTue20:00 - 21:00 EducationIzar Tarandach , Alyssa Millerizartarandach Alyssa Miller@izar_t Alyssa Millercreate tweet
4AMA with Jeremiah GrossmanTue20:30 - 22:00DevSecOps DevSecOpsDinis Cruz , Jeremiah Grossmandiniscruz grossmanjeremiah@DinisCruz @jeremiahgcreate tweet
5API Security by DesignTue16:00 - 17:00DevSecOps DevSecOpsJose Haro Peraltacreate tweet
6Applying Zero Trust Principles to OT/ICS (Operational Technology & Industrial Control Systems)Tue16:00 - 17:00DevSecOps DevSecOpsCeline Pypaertceline-cp@_queuebitscreate tweet
7AppSec Threats Deserve Their Own Incident Response PlanTue15:00 - 16:00DevSecOps DevSecOpsOmer Yaroncreate tweet
8Attack Surface MappingTue17:00 - 18:00Governance GovernanceSimon Wardley , Dinis Cruz , Tariq Rashid , Krzysztof Daniel , Tudor Girba diniscruz christopherdaniel girba@swardley @DinisCruz @rzeta0 @wardleymaps @feenkcomcreate tweet
9Battling the coming wave, Understanding cybersecurity in 2024Tue17:00 - 18:00Governance GovernanceJames Dellcreate tweet
10ChatGPT: Cyber Risks & How to Harden Against ThemTue17:00 - 18:00 ChatGPTCeline Pypaert , Craig Gilliver , Pages(1) , Pages(1)celine-cp Craig Gilliver Pages(1) Pages(1)@_queuebits Craig Gilliver Pages(1) Pages(1)create tweet
11CISO Role in 2023 (Panel)Tue16:00 - 17:00Governance GovernanceDinis Cruz , Sheetal Joseph , Abbas Haidar , Tim Ward , Sarb Sembhidiniscruz abbashaidar tim-ward-cyber sarbsembhi@DinisCruz @AbbasHaidar_ @thinkcyberuk @sarbsembhicreate tweet
12CISO Roundtable - Mar 2022Tue17:00 - 18:00Governance GovernanceAnte Gulam , Chase Fopiano , Dinis Cruz , Nick Gibson , Marios Clark , Sheetal Josephagulam myvirtualciso diniscruz nickbgibson marios-clark@ante_gulam @MyVirtualCISO @DinisCruz @SecurityIdeals @n3tw0rks3ccreate tweet
13Compliant Kubernetes - Case StudyTue16:00 - 17:00DevSecOps DevSecOpsJakub Krzywda , Cristian Kleincreate tweet
14Content Delivery & Security AssociationTue17:00 - 18:00Governance GovernanceBen Schofieldcreate tweet
15Continuous Access Control with OPAL and CedarTue16:00 - 17:00DevSecOps DevSecOpsGabriel L. Manorgmanor@gemanorcreate tweet
16Creating 1 million kubernetes pods - Lessons learnedTue17:00 - 18:00DevSecOps DevSecOpsMatthew Pigram , Dharam Patelcreate tweet
17CVSS, CVE, Vulnerabilities and the land of broken dreamsTue15:00 - 16:00DevSecOps DevSecOpsFrancesco Cipollonefracipo@FrankSEC42create tweet
18Cyber Insurance - a deeper approachTue18:00 - 19:00Governance GovernanceDinis Cruz , Abbas Haidar , Andrew Leadiniscruz abbashaidar Andrew Lea@DinisCruz @AbbasHaidar_ Andrew Leacreate tweet
19Cybersecurity assessments: finding the way forwardTue18:00 - 19:00Risk and Governance Risk and GovernanceAnna Lezhikovacreate tweet
20Demystifying Risk and the Future of Vulnerability ManagementTue14:00 - 15:00Governance GovernanceSashank Darasashankdara@sashank_daracreate tweet
21Developing Secure Multi-Cloud Kubernetes ApplicationsTue15:00 - 16:00Kubernetes KubernetesPetra Vukmirovic , Dinis Cruzpetravukmirovic diniscruz@PetraVuk1311 @DinisCruzcreate tweet
22Encrypted Calendars - the need and consequencesTue18:30 - 20:30Governance GovernanceMark Potkewitzpotkewitz@potkewitzcreate tweet
23Exploring A Risk Approach to Software Supply Chain SecurityTue16:00 - 17:00DevSecOps DevSecOpsAbdullah GarciaAbdullah GarciaAbdullah Garciacreate tweet
24From Kubernetes to a Portable Secure and Compliant Platform: Databases, Message Queues and CachesTue14:00 - 15:00Kubernetes KubernetesCristian Kleincreate tweet
25Graph Based Vulnerability ManagementTue15:00 - 16:00Governance GovernanceChris Holman , Petra Vukmirovicpetravukmirovic@PetraVuk1311create tweet
26How GenAI Agents will Dramatically Change our IndustryTue18:00 - 19:00DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
27How Owasp can help Security Teams - Guides and Testing ToolsTue15:00 - 16:00Owasp OwaspDinis Cruz , Sam Stepanyan , Grant Ongers , Vandana Vermadiniscruz rewtd @DinisCruz @securestep9 @rewtd @InfosecVandanacreate tweet
28How Owasp can help Security Teams - Guides and Testing ToolsTue16:00 - 17:00missingDinis Cruz , Sam Stepanyan , Grant Ongers , Vandana Vermadiniscruz rewtd @DinisCruz @securestep9 @rewtd @InfosecVandanacreate tweet
29How to Operate a Secure Kubernetes platformTue18:00 - 19:00DevSecOps DevSecOpsCristian Kleincreate tweet
30Incident Response Playbooks (Panel)Tue17:00 - 18:00missingDinis Cruz , Eliza-May Austin , Venkat Ramshet , Nick Harrisdiniscruz elizamayaustin venkat-ramshet@DinisCruz @Eliza_MayAustin @FlexibleIrcreate tweet
31IoT and Cyber Threat Intelligence: Staying Ahead of the Curve (Panel)Tue15:00 - 16:00DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
32Managing projects using Github Issues and ZenHubTue17:00 - 18:00Owasp OwaspGeorgina Gonzalezcreate tweet
33Mitigating Risks Through Open-Source Bitcoin TracingTue18:30 - 20:30DevSecOps DevSecOpsMargaux EckleMargaux EckleMargaux Ecklecreate tweet
34Moldable development with Glamorous Toolkit Part 1Tue16:00 - 17:00missingDinis Cruz , Tudor Girbadiniscruz girba@DinisCruz @feenkcomcreate tweet
35OISRU - Open Information Security Risk Universe (Panel)Tue15:00 - 16:00Governance GovernanceSashank Dara , Dinis Cruz , Eliza-May Austin , Puneet Ahujasashankdara diniscruz elizamayaustin@sashank_dara @DinisCruz @Eliza_MayAustincreate tweet
36Open Policy AgentTue17:00 - 18:00DevSecOps DevSecOpsTimo Pagelcreate tweet
37OSS DevSecOps projetTue18:00 - 19:30DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
38OWASP Top Ten Part 2Tue20:00 - 21:00DevSecOps DevSecOpsJim Manicojmanico@manicodecreate tweet
39OWASP WrongSecrets: a journey into secret management failuresTue15:00 - 16:00Governance GovernanceJeroen Willemsenjeroen-willemsen@commjoeniecreate tweet
40Permission Models As Code - Securing the Entire StackTue17:00 - 18:00DevSecOps DevSecOpsRaz Cohen , Oded Ben Davidodedbendavid@BDOdedcreate tweet
41Practical approach/considerations to developing a cybersecurity programTue15:00 - 16:00Governance GovernanceRichea Perrycreate tweet
42Privacy As Code: Open-Source Developer Tools For Data PrivacyTue15:00 - 16:00DevSecOps DevSecOpsThomas La Pianacreate tweet
43Protecting Critical Data, through the implementation of Information Security Management System to meet complianceTue15:00 - 16:00Governance GovernanceRichea Perrycreate tweet
44Refresher on Security LabelsTue18:30 - 20:30Security Labels Security LabelsDinis Cruz , James Bore , David Clarke , Adam Leon Smithdiniscruz jbore @DinisCruz @Coffee_Fueled @1DavidClarke @adamleonsmithcreate tweet
45Risk Communication: Bridging the Gap between Risk Professionals and Executives (Panel)Tue16:00 - 17:00Governance GovernanceDanny Lopez , Richea Perry , Pages(1) , Pages(1) , [Guy Marong] , Pages(1)Danny Lopez Pages(1) Pages(1) [Guy Marong] Pages(1)Danny Lopez Pages(1) Pages(1) [Guy Marong] Pages(1)create tweet
46Rules & Recommendations: Are we pushing our new IoT device out correctly?Tue16:00 - 17:00Governance GovernanceMaya Boeckhnicolas-boeckh@AtomicNicoscreate tweet
47Scaling Kubernetes - One Pod per fileTue18:30 - 20:30DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
48Schrems II - Finding workable solutionsTue18:30 - 20:30Schrems II Schrems IIDinis Cruz , James Bore , David Clarke , Adam Leon Smith , Carey Lening , Mark Potkewitzdiniscruz jbore potkewitz@DinisCruz @Coffee_Fueled @1DavidClarke @adamleonsmith @potkewitzcreate tweet
49Security as Code: A DevSecOps ApproachTue16:00 - 17:00DevSecOps DevSecOpsJoseph Katsioloudesjkcso@jkcsocreate tweet
50Security Champions - Sharing ExperiencesTue17:00 - 18:00Governance GovernanceDinis Cruz , Timo Pageldiniscruz@DinisCruzcreate tweet
51SemGrep in the CI/CD Pipeline: Automating Code Quality and Security Checks (Panel)Tue15:00 - 16:00Semgrep SemgrepDinis Cruzdiniscruz@DinisCruzcreate tweet
52Software Security and Threat ModellingTue18:00 - 19:30Threat Modeling Threat ModelingBrook S.E. Schoenfieldbrookschoenfield@brkschoenfieldcreate tweet
53Stop Committing Your Secrets - Git Hooks To The RescueTue18:00 - 19:00DevSecOps DevSecOpsDwayne McDanieldwaynemcdaniel@mcdwaynecreate tweet
54Taking Your DevOps Tooling To The Dark SideTue17:00 - 18:00DevSecOps DevSecOpsMike GuthrieMike GuthrieMike Guthriecreate tweet
55The Business case for Security ChampionsTue18:00 - 19:30Governance GovernanceDinis Cruz , Oludiniscruz Olu@DinisCruz Olucreate tweet
56The Cloud Security Architects aka the knights of the cloud kingdom - Panel DiscussionTue15:00 - 16:00 Cloud-SecurityPetra Vukmirovic , Manos Skalidis , Francesco Cipollone , Lee Newcombe , Kriti Mohunpetravukmirovic emanouilskalidis fracipo leenewcombe/ kritimohun@PetraVuk1311 @MSkalidis @FrankSEC42 @lee_newcombe @krytron123create tweet
57The Cybersecurity Talent Gap: Addressing the Growing Skills Shortage(Panel)Tue17:00 - 18:00Governance GovernanceDinis Cruz , Chen Gour-Ariediniscruz@DinisCruzcreate tweet
58The Human FirewallTue15:00 - 16:00Governance GovernanceRichea Perrycreate tweet
59Threat Hunting and Detection Strategies: Proactive Defense in Action (panel)Tue15:00 - 16:00Threat Modeling Threat ModelingDinis Cruz , Marius Poskusdiniscruz marius-poskus-92611b22@DinisCruz @Marius_poskus1create tweet
60Threat mapping - A workshop discussionTue16:00 - 18:00Threat Modeling Threat ModelingJakub Kaluznyjakubkaluzny@j_kaluznycreate tweet
61Threat Modeling Glasswall DesktopTue16:00 - 17:00Threat Modeling Threat ModelingDinis Cruz , Petra Vukmirovic , Mudit Guptadiniscruz petravukmirovic @DinisCruz @PetraVuk1311 @Mudit__Guptacreate tweet
62Tune your Toolbox for Velocity and Value (SCA)Tue14:00 - 15:00DevSecOps DevSecOpsJosh Grossmanjoshcgrossman@JoshCGrossmancreate tweet
63Using Elastic and Kibana for Scale and Security VisualisationTue18:00 - 19:30DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
64Using Kubernetes to create a scalable Security Proxy solutionTue18:30 - 20:30DevSecOps DevSecOpsDinis Cruz , Didar Gelici , Ben Schofield , Nick Drage , [Wallaby Curtis]diniscruz didargelici Nick Drage [Wallaby Curtis]@DinisCruz @DGelici Nick Drage [Wallaby Curtis]create tweet
65Using Open Source AppMap for Runtime Security AnalysisTue16:00 - 17:00DevSecOps DevSecOpsPete Cheslockpetecheslock@petecheslockcreate tweet
66Why you don't need to be technical to get into securityTue18:00 - 19:00 MiscAshley Burkeashburke@burkethelobstercreate tweet
67WordPress: Hacking and SecuringTue19:00 - 20:00DevSecOps DevSecOpsSam Stepanyan@securestep9create tweet
68Zero Trust Architecture: Redefining Security Perimeters(panel)Tue18:00 - 19:00DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet

Wed

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1Adversary Simulation: Close the Gaps in Your Security PostureWed18:00 - 19:30Governance GovernanceDon Murdochdon-murdoch-gse-msise-mba-30b1007@BlueTeamHbcreate tweet
2Agile Threat Modeling with Open-Source ToolsWed16:00 - 17:00Threat Modeling Threat ModelingChristian Schneidercschneider4711@cschneider4711create tweet
3Agile Threat Modeling with Open-Source ToolsWed20:30 - 21:30Threat Modeling Threat ModelingChristian Schneidercschneider4711@cschneider4711create tweet
4AI ML European regulationWed18:30 - 20:30missingJeff Jockisch , Adam Leon Smith , Federico Marengo@adamleonsmithcreate tweet
5Alert Readiness FrameworkWed16:00 - 17:00Governance GovernanceRui Shantilalcreate tweet
6AMA with Adam ShostackWed20:30 - 21:30Threat Modeling Threat ModelingIzar Tarandach , Adam Shostackizartarandach shostack@izar_t @adamshostackcreate tweet
7AMA with Brook SchoenfieldWed18:00 - 19:30Governance GovernanceBrook S.E. Schoenfield , Izar Tarandachbrookschoenfield izartarandach@brkschoenfield @izar_tcreate tweet
8AMA with Jim ManicoWed20:30 - 22:00DevSecOps DevSecOpsDinis Cruz , Jim Manicodiniscruz jmanico@DinisCruz @manicodecreate tweet
9AMA with Mark CurpheyWed20:00 - 21:00Governance GovernanceDinis Cruz , Mark Curpheydiniscruz curphy@DinisCruz @curpheycreate tweet
10Are our users always smarter than AI?Wed17:00 - 18:00Risk and Governance Risk and GovernanceSarb Sembhisarbsembhi@sarbsembhicreate tweet
11Automating Architectural Risk Analysis with the Open Threat Model formatWed14:00 - 15:00Threat Modeling Threat ModelingFraser Scottzeroxten@zeroXtencreate tweet
12Building Security ChampionsWed17:00 - 18:00Governance GovernanceTanya Jancatanya-janca@shehackspurplecreate tweet
13CDR API StandardWed16:00 - 17:00CDR CDRDinis Cruz , Elvin Whitediniscruz@DinisCruzcreate tweet
14CDR Engine Standard (Part 1)Wed16:00 - 17:00CDR CDRPaul Burkemisterbee@misterbeecreate tweet
15ChatGPT and GenAI Privacy - Massive Uncertainty and Massive OpportunityWed18:00 - 19:00DevSecOps DevSecOpsDinis Cruz , Sarah Clarkediniscruz@DinisCruzcreate tweet
16ChatGPT for Security Teams - What & HowWed15:00 - 16:00 ChatGPTDinis Cruzdiniscruz@DinisCruzcreate tweet
17Cloud Security Best Practices: Navigating the Evolving Landscape (Panel)Wed15:00 - 16:00 Cloud SecurityDinis Cruzdiniscruz@DinisCruzcreate tweet
18Cloud-Native Security Tools: Enhancing Cloud Protection Capabilities(Panel)Wed15:00 - 16:00DevSecOps DevSecOpsDinis Cruz , Gabriel L. Manor , Or Weis , Oded Ben Daviddiniscruz gmanor orweis odedbendavid@DinisCruz @gemanor @OrWeis @BDOdedcreate tweet
19Conducting effective Table Top Exercises for Cyber Incident Response Practise (Panel)Wed16:00 - 17:00Governance GovernanceDinis Cruz , Venkat Ramshet , Nathan Case , Guy Marongdiniscruz venkat-ramshet nathancase Guy Marong@DinisCruz @FlexibleIr @karmichand Guy Marongcreate tweet
20Context is king; Prioritization is queen, and CVSS is deadWed15:00 - 16:00DevSecOps DevSecOpsFrancesco Cipollonefracipo@FrankSEC42create tweet
21Cooking the perfect docker container for a react app Part 2Wed15:00 - 16:00DevSecOps DevSecOpsLuis Servin@lfservincreate tweet
22Crowdsourcing Security TalentWed18:00 - 19:00Governance GovernanceDinis Cruz , Ante Gulamdiniscruz agulam@DinisCruz @ante_gulamcreate tweet
23Cyber InsuranceWed15:00 - 16:00Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
24Data Integrity and Information Integrity-they are enterprise not just CISO issuesWed17:00 - 18:00Governance GovernanceSarb Sembhisarbsembhi@sarbsembhicreate tweet
25Finding and Hiring Security Talent (Panel)Wed17:00 - 18:00missingDinis Cruz , Michael Meaney , Eliza-May Austin , Brian Hinojosadiniscruz elizamayaustin@DinisCruz @Eliza_MayAustincreate tweet
26Going Multicloud: Securing Human and Service Identities in AWS vs AzureWed15:00 - 16:00DevSecOps DevSecOpsLior Zatlavilior-zatlavi-10865441@CloudLiocreate tweet
27Hiring manager insights to secure your next security role/team memberWed19:00 - 20:00Governance GovernanceMichael Meaneycreate tweet
28How Owasp can help Security Teams - DevSecOpsWed15:00 - 16:00Owasp OwaspDinis Cruz , Sam Stepanyan , Grant Ongersdiniscruz rewtd@DinisCruz @securestep9 @rewtdcreate tweet
29How Owasp can help Security Teams - DevSecOpsWed16:00 - 17:00missingDinis Cruz , Sam Stepanyan , Grant Ongersdiniscruz rewtd@DinisCruz @securestep9 @rewtdcreate tweet
30In the moment nudges – What? How? Applying nudge theory to awarenessWed16:00 - 17:00Risk and Governance Risk and GovernanceTim Wardtim-ward-cyber@thinkcyberukcreate tweet
31Jim and Dinis Talk AppsecWed20:00 - 21:00DevSecOps DevSecOpsDinis Cruz , Jim Manicodiniscruz jmanico@DinisCruz @manicodecreate tweet
32Kubernetes SecurityWed15:00 - 16:00DevSecOps DevSecOpsUday Thubaticreate tweet
33Linux (kernel) containerization without Docker/runc/OCIWed15:00 - 16:00DevSecOps DevSecOpsDheeraj Madhukardheerajtechnolegends@Dheerajmadhukarcreate tweet
34Live threat modeling of an "online food ordering" systemWed16:00 - 17:00Threat Modeling Threat ModelingLuis Servin@lfservincreate tweet
35Modern Office SpacesWed18:30 - 20:30Governance GovernanceDinis Cruz , Adam Leon Smithdiniscruz @DinisCruz @adamleonsmithcreate tweet
36Moldable development with Glamorous Toolkit Part 2Wed15:00 - 16:00missingDinis Cruz , Tudor Girbadiniscruz girba@DinisCruz @feenkcomcreate tweet
37OSS Semgrep projectWed18:00 - 19:30Semgrep SemgrepDinis Cruzdiniscruz@DinisCruzcreate tweet
38Overview of the new DSOMM ApplicationWed18:00 - 19:00DevSecOps DevSecOpsAryan Prasad@0x41headcreate tweet
39OWASP Security Bot - Hypercharge your Cloud AutomationWed18:00 - 19:30OWASP OWASPDinis Cruzdiniscruz@DinisCruzcreate tweet
40OWASP Wrong Secrets: project goals, under the hood, and where do we go from here?Wed16:00 - 17:00OWASP OWASPBen Dehaan , Jeroen WillemsenBen Dehaan jeroen-willemsenBen Dehaan @commjoeniecreate tweet
41OWASP WrongSecrets: define the future challenges togetherWed15:00 - 16:00Governance GovernanceJeroen Willemsen , Ben De Haanjeroen-willemsen ben-de-haan-65423441@commjoenie @BJFdeHaancreate tweet
42Predicting the rise and fall of an open source projectWed14:00 - 15:00Governance GovernanceEmil Wåreushttps://www.linkedin.com/in/emilwareus/@https://twitter.com/emil_wareuscreate tweet
43Purple Teaming with OWASP PurpleTeamWed20:00 - 21:00DevSecOps DevSecOpsKim Cartercarterkim@binarymistcreate tweet
44Pyroscope internals and Using Pyroscope for real-time view of Cloud/Serverless ApplicationsWed18:30 - 20:30 DevSecopsDmitry FilimonovDmitry FilimonovDmitry Filimonovcreate tweet
45Ransomware Resilience: Strategies for Prevention and Recovery(panel)Wed16:00 - 17:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
46Reporting responsibilities for CISOsWed18:00 - 19:00Governance GovernanceAnte Gulam , Dinis Cruzagulam diniscruz@ante_gulam @DinisCruzcreate tweet
47Secure by ScenarioWed18:30 - 20:30Secure by Scenario Secure by ScenarioJames Bore , Didar Gelicijbore didargelici@Coffee_Fueled @DGelicicreate tweet
48Secure By ScenarioWed16:00 - 17:00Secure by Scenario Secure by ScenarioJuan Spinelcreate tweet
49Secure By ScenarioWed16:00 - 17:00Secure by Scenario Secure by ScenarioJuan Spinelcreate tweet
50Secure By ScenarioWed17:00 - 18:00Secure by Scenario Secure by ScenarioJuan Spinelcreate tweet
51Security business enabler: How to align your security program to business goalsWed16:00 - 17:00Governance GovernanceMarius Poskus , Dinis Cruzmarius-poskus-92611b22 diniscruz@Marius_poskus1 @DinisCruzcreate tweet
52Security Design & Guidance at scaleWed18:00 - 19:00Governance GovernanceNielet Dmellonieletdmello@dmellonieletcreate tweet
53Security-Scan your production imagesWed17:00 - 18:00DevSecOps DevSecOpsTimo Pagelcreate tweet
54Testing Ephemeral Kubernetes ApplicationsWed18:30 - 20:30DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
55The Modern Data Broker LandscapeWed20:30 - 22:00Governance GovernanceJeff JockishJeff JockishJeff Jockishcreate tweet
56The Rise of AI Security EngineersWed15:00 - 16:00DevSecOps DevSecOpsStefan StreichsbierStefan StreichsbierStefan Streichsbiercreate tweet
57Threat Model for an Autonomous SystemWed16:00 - 17:00Threat Modeling Threat ModelingAbbas Haidarabbashaidar@AbbasHaidar_create tweet
58Threat Modeling for Schrems IIWed18:30 - 20:30Threat Modeling Threat ModelingDinis Cruz , James Bore , David Clarkediniscruz jbore @DinisCruz @Coffee_Fueled @1DavidClarkecreate tweet
59Threat Modeling for Serverless Architectures: Identifying Risks in a Serverless World (Panel)Wed17:00 - 18:00Threat Modeling Threat ModelingDinis Cruz , Luis Servin , Ayse Vlok , Omer Yarondiniscruz @DinisCruz @lfservincreate tweet
60Threat Modeling KataWed18:00 - 19:00Threat Modeling Threat ModelingLuis Servin@lfservincreate tweet
61Threat Modeling ManifestoWed18:30 - 20:30Threat Modeling Threat ModelingAvi Douglen , Jonathan Marcil , Chris Romeo , Izar Tarandach , Kim Wuyts , Brook S.E. Schoenfield , Matthew Colesavidouglen jonathanmarcil securityjourney izartarandach kwuyts brookschoenfield matthew-coles@sec_tigger @jonathanmarcil @edgeroute @izar_t @Wuytski @brkschoenfield @coles_matthewjcreate tweet
62Turning the Tide : How to convince Senior Management and Ownership to invest in CybersecurityWed17:00 - 18:00Governance GovernanceJames Dellcreate tweet
63Using Jira to Map and Visualise RisksWed16:00 - 18:00Risk and Governance Risk and GovernancePetra Vukmirovic , Abbas Haidar , Chris Holmanpetravukmirovic abbashaidar@PetraVuk1311 @AbbasHaidar_create tweet
64Using OWASP Nettacker for Recon and Vulnerability ScanningWed16:00 - 17:00DevSecOps DevSecOpsSam Stepanyan@securestep9create tweet
65We need second-order thinking in securityWed14:00 - 15:00Governance GovernanceDeepak Prabhakaradeepakp@deepakprabcreate tweet
66When C4s meet Threat ModelsWed16:00 - 17:00Threat Modeling Threat ModelingMarios Clark , Ahmed Mohamed , Petra Vukmirovicmarios-clark me2resh petravukmirovic@n3tw0rks3c @me2resh @PetraVuk1311create tweet

Thu

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1A call for MetricsThu15:00 - 16:00DevSecOps DevSecOpsTimo Pagel , Lars Hermerschmidt , Benjamin Trapp Benjamin Trapp@bob5ec Benjamin Trappcreate tweet
2A Cyber Security Roadmap: How To?Thu16:00 - 17:00Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
3AMA with Gary McGrawThu20:00 - 21:00Governance GovernanceIzar Tarandach , Gary McGrawizartarandach @izar_t @cigitalgemcreate tweet
4AMA with Simon WardleyThu10:30 - 12:00Wardley Maps Wardley MapsDinis Cruz , Simon Wardleydiniscruz @DinisCruz @swardleycreate tweet
5An Interactive Session on Teamwork and Collaboration ToolsThu18:00 - 19:00Governance GovernanceDr Daniel Shore , Zachary Broomfieldcreate tweet
6Anticipating the Future: Strengthening App Security through Developer-Centric ForesightThu16:00 - 17:00DevSecOps DevSecOpsJeremy Treadwelljeremytreadwell@Jtread0000create tweet
7AppSec Trending & recommendations:Fixing Security in Cloud & AppsecThu16:00 - 17:00DevSecOps DevSecOpsFrancesco Cipollonefracipo@FrankSEC42create tweet
8Automation and scale with OWASP ZAPThu16:00 - 17:00DevSecOps DevSecOpsTiago Mendotiagomendo@tmendocreate tweet
9Bakeoff - Anti-virus vs CDR vs SandboxingThu17:00 - 18:00 Content Disarm & ReconstructionPaul Burkemisterbee@misterbeecreate tweet
10Beat Alert Fatigue with Cyber Asset Relationship GraphsThu18:00 - 19:30DevSecOps DevSecOpsJasmine Henryjasminehenry10@jasminehenry10create tweet
11Build state of the art SOC with Mitre AttackThu17:00 - 18:00Governance GovernanceMarius Poskusmarius-poskus-92611b22@Marius_poskus1create tweet
12CDR Engine Standard (Part 2)Thu16:00 - 17:00CDR CDRPaul Burkemisterbee@misterbeecreate tweet
13Championing Security: Scaling Security At Every LevelThu18:00 - 19:00Governance GovernanceDwayne McDanieldwaynemcdaniel@mcdwaynecreate tweet
14ChatGPT impact on Cyber and Application Security (Panel)Thu15:00 - 16:00missingDinis Cruz , Nathan Casediniscruz nathancase@DinisCruz @karmichandcreate tweet
15Cooking the perfect docker container for a react appThu15:00 - 16:00Kubernetes KubernetesLuis Servin@lfservincreate tweet
16Creating the GenAI Athena Bot from the theCyberboardroom.comThu18:00 - 19:00DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
17DevSecOps for Modern Identity and Access ManagementThu15:00 - 16:00DevSecOps DevSecOpsOr Weis , Barak Schoster Goihman , Dinis Cruz , Marius Poskusorweis barakschoster diniscruz marius-poskus-92611b22@OrWeis @BarakSchoster @DinisCruz @Marius_poskus1create tweet
18Distroless ContainersThu17:00 - 18:00Owasp OwaspTimo Pagelcreate tweet
19Docker For Security ProfessionalsThu15:00 - 16:00DevSecOps DevSecOpsRakesh Elamaranrakeshelamaran98@rakeshoffclcreate tweet
20DSOMM News and Belts-WorkshopThu17:00 - 18:00DevSecOps DevSecOpsTimo Pagelcreate tweet
21Fundamentals of Cloud Security, Threat Identification, AWS ServicesThu14:00 - 15:00DevSecOps DevSecOpsRakesh Elamaranrakeshelamaran98@rakeshoffclcreate tweet
22How to become a cyber security professional? (i.e. where to start?)Thu19:00 - 20:00 Education and TrainingDinis Cruzdiniscruz@DinisCruzcreate tweet
23Introduction into OWASP DSOMMThu17:00 - 18:00missingTimo Pagelcreate tweet
24Learn Threat Modeling using the amazing OSS resourcesThu18:00 - 19:30Threat Modeling Threat ModelingDinis Cruzdiniscruz@DinisCruzcreate tweet
25Living off the Land & Fileless Attacks - Move Beyond the "Known Bad"Thu18:00 - 19:00DevSecOps DevSecOpsCeline Pypaert , Craig Gilliver , Pages(1) , [Éireann Leverett] , Pages(1)celine-cp Craig Gilliver Pages(1) [Éireann Leverett] Pages(1)@_queuebits Craig Gilliver Pages(1) [Éireann Leverett] Pages(1)create tweet
26Low-code access control: Making the complex world of permissions approachable to everyoneThu15:00 - 16:00DevSecOps DevSecOpsFilip Grebowskideveloperfilip@DeveloperFilipcreate tweet
27Making ASVS truly yoursThu15:00 - 16:00OWASP OWASPLuis Servin@lfservincreate tweet
28Maturity Mapping: Contextualise change and learningThu18:30 - 20:30Wardley Maps Wardley MapsChris McDermott@chrisvmcdcreate tweet
29OSS Threat Modeling and Moldable Development ProjectsThu18:00 - 19:30Threat Modeling Threat ModelingDinis Cruz , Tudor Girbadiniscruz girba@DinisCruz @feenkcomcreate tweet
30OWASP DSOMM Enhancement WorkshopThu18:30 - 20:30DevSecOps DevSecOpsTimo Pagelcreate tweet
31Positive Security models and Rebuilding into a "Known Good" stateThu16:00 - 17:00CDR CDRDinis Cruzdiniscruz@DinisCruzcreate tweet
32Product Permissions - Common Pitfalls and How Not to Fall For ThemThu15:00 - 16:00Governance GovernanceOr Weisorweis@OrWeiscreate tweet
33Ransomware Resilience: Strategies for Prevention and Recovery (Panel)Thu15:00 - 16:00DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
34Rise of Automotive Attacks (Panel Discussion)Thu15:00 - 16:00Governance GovernanceAbbas Haidar , Dinis Cruzabbashaidar diniscruz@AbbasHaidar_ @DinisCruzcreate tweet
35Risk Acceptance and OISRU (Panel)Thu15:00 - 16:00Risk and Governance Risk and GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
36Risk treatment planning in modern tech space (Panel)Thu18:00 - 19:00Governance GovernanceDinis Cruz , Marius Poskus , Izar Tarandachdiniscruz marius-poskus-92611b22 izartarandach@DinisCruz @Marius_poskus1 @izar_tcreate tweet
37Scaling CyberSecurity teams using GenAIs and FMsThu18:00 - 19:00Governance GovernanceAnte Gulam , Dinis Cruz , Jakub Kaluznyagulam diniscruz jakubkaluzny@ante_gulam @DinisCruz @j_kaluznycreate tweet
38Scaling Your Security Program with SemgrepThu17:00 - 19:00DevSecOps DevSecOpsClint Gibler@clintgiblercreate tweet
39Schrems II - Finding workable solutionsThu18:30 - 20:30Schrems II Schrems IIDinis Cruz , James Bore , David Clarke , Adam Leon Smith , Carey Lening , Mark Potkewitzdiniscruz jbore potkewitz@DinisCruz @Coffee_Fueled @1DavidClarke @adamleonsmith @potkewitzcreate tweet
40Secure By ScenarioThu18:30 - 20:30Secure By Scenario Secure By ScenarioJames Borejbore@Coffee_Fueledcreate tweet
41Security Labels & Schrems IIThu18:30 - 20:30Security Labels Security LabelsDinis Cruz , James Bore , David Clarke , Adam Leon Smithdiniscruz jbore @DinisCruz @Coffee_Fueled @1DavidClarke @adamleonsmithcreate tweet
42SOC2 Certification for SaaS companiesThu15:00 - 16:00Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
43Sonar Cube Integrations with GitHubThu16:00 - 17:00DevSecOps DevSecOpsPetra Vukmirovic , Jameel Nabbopetravukmirovic @PetraVuk1311 @jameel_nabbocreate tweet
44Spreading security across the SDLC (with semgrep and other tools)Thu18:30 - 20:30DevSecOps DevSecOpsJohn Melton@_jtmeltoncreate tweet
45Technical Leadership and InfluenceThu18:00 - 19:30Governance GovernanceBrook S.E. Schoenfieldbrookschoenfield@brkschoenfieldcreate tweet
46Technics to limit hallucinations when using a LLM solution like ChatGPTThu17:00 - 18:00Governance GovernanceMatthew ThompsonMatthew ThompsonMatthew Thompsoncreate tweet
47The challenge of auditing smart contract audit, especially ones with more advanced cryptographic primitives such as ZKP or MPCThu16:00 - 17:00Governance GovernanceAnish Mohammedanishmohammed@anishmohammedcreate tweet
48The Challenges With DNS SecurityThu14:00 - 15:00Governance GovernanceJude Pereira , Dinis Cruzdiniscruz@DinisCruzcreate tweet
49The OWASP Top Ten 2021 ReleaseThu20:30 - 21:30OWASP OWASPJim Manicojmanico@manicodecreate tweet
50The RATs and CATs of Risk - Graph based Risk FrameworkThu16:00 - 17:00Governance GovernancePetra Vukmirovic , Abbas Haidar , Chris Holmanpetravukmirovic abbashaidar@PetraVuk1311 @AbbasHaidar_create tweet
51Threat Modeling Kata IVThu16:00 - 17:00Threat Modeling Threat ModelingLuis Servin@lfservincreate tweet
52Threat Modeling Kata Part 3Thu15:00 - 16:00Threat Modeling Threat ModelingLuis Servin@lfservincreate tweet
53Threat Modeling using GenAI and Bots (panel)Thu17:00 - 18:00Threat Modeling Threat ModelingDinis Cruz , Jakub Kaluznydiniscruz jakubkaluzny@DinisCruz @j_kaluznycreate tweet
54Threat Modeling Using Glamorous ToolkitThu15:00 - 16:00Threat Modeling Threat ModelingTudor Girba , Dinis Cruzgirba diniscruz@feenkcom @DinisCruzcreate tweet
55Threat Modeling VThu16:00 - 17:00DevSecOps DevSecOpsLuis Servin@lfservincreate tweet
56Using DataDog for Incident Response (Panel)Thu15:00 - 16:00missingNathan Case , Laura de Vesine , Dinis Cruznathancase diniscruz@karmichand @DinisCruzcreate tweet
57Using Domain Specific Languages (DSL) for testingThu15:00 - 16:00DevSecOps DevSecOpsPandy Knight@AutomationPandacreate tweet
58Using Elastic for Incident Response (Panel)Thu17:00 - 18:00missingDinis Cruz , Eliza-May Austindiniscruz elizamayaustin@DinisCruz @Eliza_MayAustincreate tweet
59Using Presentations instead of CVs and Creating Diverse Security TeamsThu16:00 - 17:00Governance GovernanceAlex Emmerson , Dinis Cruz , Pages(1) , Pages(1)Alex Emmerson diniscruz Pages(1) Pages(1)Alex Emmerson @DinisCruz Pages(1) Pages(1)create tweet
60Using Splunk for Incident Response (Panel)Thu16:00 - 17:00DevSecOps DevSecOpsDinis Cruzdiniscruz@DinisCruzcreate tweet
61Why Wardley Maps changed how I thinkThu18:00 - 19:00Wardley Maps Wardley MapsDinis Cruzdiniscruz@DinisCruzcreate tweet
62Workshop on creating C# Tools using the Owasp O2 PlatformThu18:30 - 20:30missingDinis Cruzdiniscruz@DinisCruzcreate tweet
63Yor:Automated IaC tag and traceThu16:00 - 17:00DevSecOps DevSecOpsStephen Giguerestevegiguere@StephenGiguerecreate tweet
64Zero Trust Architecture: Strengthening Cloud Security Posture (Panel)Thu17:00 - 18:00Governance GovernanceDinis Cruz , Nathan Case , Ogechukwu Okonor , Gabriel L. Manor , Or Weis , Oded Ben David , Maciej Owsianydiniscruz nathancase gmanor orweis odedbendavid@DinisCruz @karmichand @gemanor @OrWeis @BDOdedcreate tweet
65Zero Trust Database Access Using OpenZiti and JDBCThu17:00 - 18:00DevSecOps DevSecOpsMarcos Schejtmancreate tweet
66Zero trust in distributed media workflows for HollywoodThu15:00 - 16:00Governance GovernanceBen Schofieldcreate tweet

Fri

#titlewhen daywhen timetrackorganiserslinkedIntwitterPROMOTE
1ASVS User Stories creationFri16:00 - 18:00Owasp OwaspMario Plattcreate tweet
2ASVS User Stories creationFri17:00 - 18:00Owasp OwaspMario Plattcreate tweet
3ASVS User Stories creationFri16:00 - 17:00Owasp OwaspMario Plattcreate tweet
4ASVS User Stories creation - Part 6Fri16:00 - 18:00Owasp OwaspMario Plattcreate tweet
5ASVS User Stories creation - Part 7Fri16:00 - 18:00Owasp OwaspMario Plattcreate tweet
6ASVS User Stories creation - Part 8Fri16:00 - 18:00OWASP OWASPMario Plattcreate tweet
7ASVS User Stories creation - Part 9Fri16:00 - 18:00OWASP OWASPMario Plattcreate tweet
8ASVS User Stories creation (part 1)Fri16:00 - 17:00missingMario Plattcreate tweet
9ASVS User Stories creation (part 2)Fri17:00 - 18:00missingMario Plattcreate tweet
10Awards and Networking / drinks timeFrimissing SocialDinis Cruz , Didar Gelici , TBCdiniscruz didargelici TBC@DinisCruz @DGelici TBCcreate tweet
11AWS Security Hub (Panel)Fri17:00 - 18:00DevSecOps DevSecOpsDinis Cruz , Ayse Vlok , Rakesh Elamaran , Ola Oladapodiniscruz rakeshelamaran98 Ola Oladapo@DinisCruz @rakeshoffcl Ola Oladapocreate tweet
12Baseline Threat Modeling for Gen AI and Large Language ModelsFri15:00 - 16:00Threat Modeling Threat ModelingYemi AdetuwoYemi AdetuwoYemi Adetuwocreate tweet
13Blockchain and its SecurityFri15:00 - 16:00 MiscAnish Mohammed , Chenxi Wang , Dinis Cruz , Zenobia Godschalk , James Hookeranishmohammed chenxiwang88 diniscruz zenobiaaustingodschalk James Hooker@anishmohammed @chenxiwang @DinisCruz @ZenobiaZAG James Hookercreate tweet
14Bridging the skill gap and hiring challenges in cyberFri14:00 - 15:15Governance GovernancePetra Vukmirovic , Didar Gelici , Marios Clark , Manos Skalidis , Dinis Cruzpetravukmirovic didargelici marios-clark emanouilskalidis diniscruz@PetraVuk1311 @DGelici @n3tw0rks3c @MSkalidis @DinisCruzcreate tweet
15CDC - Collective Defence ClustersFri17:00 - 18:00Governance GovernanceDinis Cruz , Ante Gulamdiniscruz agulam@DinisCruz @ante_gulamcreate tweet
16Check out their (lateral) moves! The importance of blast radius in DevSecOpsFri15:00 - 16:00DevSecOps DevSecOpsMatt Johnsonmattjohnsonuk@MattdashJcreate tweet
17Cloud PenTesting Concepts , CloudGoat Walkthrough , Securing Cloud EndpointsFri14:00 - 15:00 Cloud-SecurityRakesh Elamaranrakeshelamaran98@rakeshoffclcreate tweet
18Creating Secure Builds of ContainersFri16:00 - 17:00DevSecOps DevSecOpsPetra Vukmirovic , Michael Hidalgopetravukmirovic@PetraVuk1311create tweet
19DATA Driven approach on vulnerabilities Appsec vs Infra (Panel)Fri17:00 - 18:00Governance GovernanceFrancesco Cipollone , Jay Jacobs , John Kinsella , Mike Shema , Pages(1) , Pages(1)fracipo Mike Shema Pages(1) Pages(1)@FrankSEC42 Mike Shema Pages(1) Pages(1)create tweet
20Developer Driven Security in high-growth environmentsFri18:00 - 19:00Governance GovernanceJakub Kaluznyjakubkaluzny@j_kaluznycreate tweet
21DevSecOps Maturity Model UpdatesFri15:00 - 16:00DevSecOps DevSecOpsTimo Pagel , Prakarsh Guptaprakarshgupta@prakkarshhcreate tweet
22Embrace Secure Defaults, Block Anti-patterns, and Kill Bug Classes with SemgrepFri18:30 - 20:30DevSecOps DevSecOpsClint Gibler@clintgiblercreate tweet
23Emerging Roles in Cybersecurity: Adapting Recruitment Strategies(Panel)Fri16:00 - 17:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
24Ethical Hacking Challenges: Evaluating Practical Skills in Selection Processes (PanelFri17:00 - 18:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
25GitHub Security Tools (Panel)Fri15:00 - 16:00missingDinis Cruz , Eliza-May Austin , Chris Reddington , Michael Meaneydiniscruz elizamayaustin chrisreddington@DinisCruz @Eliza_MayAustin @reddobowencreate tweet
26GitLab Security Tools (Panel)Fri16:00 - 17:00missingDinis Cruzdiniscruz@DinisCruzcreate tweet
27Hack your own app!Fri18:00 - 19:30DevSecOps DevSecOpsAkira Brandakirabrand@theakiraticreate tweet
28Hacking threat modelingFri16:00 - 17:00Threat Modeling Threat ModelingLuis Servin@lfservincreate tweet
29How can we make Grafana a great open source security tool?Fri16:00 - 17:00DevSecOps DevSecOpsDinis Cruz , Thomas Owendiniscruz thomas-rhys-owen@DinisCruz @TomSionCaticreate tweet
30How do male and female voices project authority in CyberFri19:15 - 20:30Governance GovernanceDanusia Rolewicz , Didar Gelici , Alan Jenkins , Ayse Vlok , Mario Plattdidargelici alanjenkins@DGelici @TheCybrSecNavcreate tweet
31How to overcome DNS security threatsFri15:00 - 16:00Governance GovernanceOsman Karancreate tweet
32How Variant Analysis and CodeQL helped secure the fight against COVID-19Fri16:00 - 17:00DevSecOps DevSecOpsAlvaro Muñoz@pwntestercreate tweet
33Ideas for Graph DBs like Neo4jFri17:00 - 18:00Governance GovernanceDinis Cruz , David Fauth , Dave Voutila , Irene Michlindiniscruz david-fauth-84a4958 davevoutila irene221b@DinisCruz @davefauth @voutilad @IreneMichlincreate tweet
34IoT Security: Safeguarding the Internet of Things Ecosystem (panel)Fri16:00 - 17:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
35Let’s go on a DATA with vulnerabilitiesFri16:00 - 17:00Governance GovernanceFrancesco Cipollonefracipo@FrankSEC42create tweet
36Leveraging Artificial Intelligence and Machine Learning in Recruitment(Panel)Fri15:00 - 16:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
37Machine Learning in SemGrep: Leveraging AI for Enhanced Static Analysis(Panel)Fri15:00 - 16:00 SemGrepDinis Cruzdiniscruz@DinisCruzcreate tweet
38Mentoring and it's challenges in Cyber SecurityFri15:30 - 16:45Governance GovernancePetra Vukmirovic , Mario Platt , Marios Clark , Manos Skalidis , James Bore , Dinis Cruzpetravukmirovic marios-clark emanouilskalidis jbore diniscruz@PetraVuk1311 @n3tw0rks3c @MSkalidis @Coffee_Fueled @DinisCruzcreate tweet
39Moldable development with Glamorous Toolkit Part 3Fri16:00 - 17:00missingDinis Cruz , Tudor Girbadiniscruz girba@DinisCruz @feenkcomcreate tweet
40Open Security Control Testing at ScaleFri16:00 - 17:00DevSecOps DevSecOpsLuis Saizlsaiz@lsaizcreate tweet
41Open Security Summit Awards and plans for 2023Fri17:00 - 18:00missingDinis Cruzdiniscruz@DinisCruzcreate tweet
42Open Security Summit Membership AwardsFri18:00 - 19:30missingDinis Cruzdiniscruz@DinisCruzcreate tweet
43OSS - Celebrating the Community and plans for 2022Fri18:00 - 19:30missingDinis Cruzdiniscruz@DinisCruzcreate tweet
44OSS OWASP ProjectFri18:00 - 19:30OWASP OWASPDinis Cruzdiniscruz@DinisCruzcreate tweet
45Owasp O2 Platform tools you can use todayFri18:30 - 20:30missingDinis Cruzdiniscruz@DinisCruzcreate tweet
46Protect Your Application, Not Just the Network. Add Zero Trust Superpowers to Your Critical Applications and SystemsFri18:00 - 19:00DevSecOps DevSecOpsClint Dovholukclint-dovholuk@OpenZiitcreate tweet
47Reciprocity: Tales of an Anthropologist in CybersecurityFri10:30 - 12:00Governance GovernanceLianne Potterliannep@anthrosecuristcreate tweet
48Resilience Engineering, Safety Science and Systems thinking - new tools for the complex worldFri17:45 - 19:00Governance GovernanceMario Platt , Petra Vukmirovic , Aaron Rinehart , Glenn Wilson , Danusia Rolewicz , Sanna Nissinenpetravukmirovic aaronsrinehart glennwilson@PetraVuk1311 @aaronrinehart @glenndynaminetcreate tweet
49Scaling Incident Response using Jira, Jupyter and GSuiteFri15:00 - 16:00DevSecOps DevSecOpsLuke Robbertse , Abbas Haidar , Petra Vukmirovicluke-robbertse-04116abb abbashaidar petravukmirovic@LukeRobbertse @AbbasHaidar_ @PetraVuk1311create tweet
50Secure By ScenarioFri18:30 - 20:30Secure by Scenario Secure by ScenarioJuan Spinelcreate tweet
51Securing CI/CD runners through eBPF agentFri16:00 - 17:00DevSecOps DevSecOpsMert Coskuner , Cenk Kalpakoglucenk-kalpakoglu@cnkk6create tweet
52Securing Remote Work Environments: Challenges and Solutions (panel)Fri17:00 - 18:00Governance GovernanceDinis Cruzdiniscruz@DinisCruzcreate tweet
53Security on autonomous systems - a long way to goFri18:00 - 19:30Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
54Security Vendors - Operating ModelFri15:00 - 16:00missingDinis Cruz , Nick Harrisdiniscruz@DinisCruzcreate tweet
55Social Engineering Attacks: Strengthening Human Firewall(Panel)Fri15:00 - 16:00Secure by Scenario Secure by ScenarioDinis Cruzdiniscruz@DinisCruzcreate tweet
56Successes and Failures at Security TrainingFri19:00 - 20:00Governance GovernanceIzar Tarandach , Chris Romeo , Dinis Cruzizartarandach securityjourney diniscruz@izar_t @edgeroute @DinisCruzcreate tweet
57Threat Modeling Glasswall Cloud SDKFri15:00 - 16:00Threat Modeling Threat ModelingDinis Cruz , Petra Vukmirovic , Chris Holman , Abbas Haidardiniscruz petravukmirovic abbashaidar@DinisCruz @PetraVuk1311 @AbbasHaidar_create tweet
58Threat Modeling Glasswall Folder-to-Folder PluginFri17:00 - 18:00Threat Modeling Threat ModelingDinis Cruz , Petra Vukmirovic , Chris Holman , Abbas Haidardiniscruz petravukmirovic abbashaidar@DinisCruz @PetraVuk1311 @AbbasHaidar_create tweet
59Threat Modelling as Code and Threat Modelling ChallengesFri15:00 - 16:00Threat Modeling Threat ModelingPetra Vukmirovic , Marios Clarkpetravukmirovic marios-clark@PetraVuk1311 @n3tw0rks3ccreate tweet
60Using AI to identify SPAM mailsFri18:00 - 19:00Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
61Using AppMap runtime code visualizations to scout for security flawsFri15:00 - 16:00DevSecOps DevSecOpsElizabeth Lawler , Kevin Gilpinelizabethlawler kegilpin/@ElizabethLawler @kegilpincreate tweet
62Using Teleport to Secure SSH and Kubernetes AccessFri14:00 - 15:00DevSecOps DevSecOpsSakshyam Shahsshahconnects@sshahtweetscreate tweet
63Vendor Security Management using JiraFri18:30 - 20:30Governance GovernanceAbbas Haidarabbashaidar@AbbasHaidar_create tweet
64Virtual PubFri18:30 - 20:30 MiscellenousDinis Cruz , Didar Gelicidiniscruz didargelici@DinisCruz @DGelicicreate tweet
65Who Goes There? Actively Detecting Intruders With Cyber Deception ToolsFri15:00 - 16:00Governance GovernanceDwayne McDanieldwaynemcdaniel@mcdwaynecreate tweet
66Women kick off in CybersecurityFri16:00 - 17:00Governance GovernanceKiran Gandhi , Surbhi Guptacreate tweet