Dinis Cruz

CTO and CISO, Glasswall

Dinis Cruz is the CTO and CISO of Glasswall and brings a unique blend of Security and Engineering expertise with 20+ years experience in Cyber Security and Software Development. Dinis is focused on creating teams and environments where engineering and security are enablers and accelerators for the business, with a big focus on the productisation and commercialisation of advanced technologies.

Dinis was nominated for CISO of the Year 2019 at #CyberSecurityAwards, and was highlighed as one of the 10 Best CSOs of 2020 by Industry Era

Dinis is also writing a book called Generation Z Developers (but useful for all Generations) available at Amazon

For more details see Dinis CV (done as a presentation)

All Dinis Cruz's sessions

TitleTrackYearMonth
AMA with Jeremiah GrossmanDevSecOps2021Jan
AMA with Jim ManicoDevSecOps2021Jan
AMA with Mark CurpheyGovernance2022Sep
AMA with OWASP Board2021Jan
AMA with Simon WardleyWardley Maps2020Dec
Automating SOC2 using JiraGovernance2021Jan
Awards and Networking / drinks timeSocial2022Jul
Blockchain and its SecurityMisc2022Sep
Bridging the skill gap and hiring challenges in cyberGovernance2022Jul
CDC - Collective Defence ClustersGovernance2022May
CDR API StandardCDR2021May
CISO Roundtable - Mar 2022Governance2022Mar
Covid Safe Paths - Threat Modeling Part 1Covid
Covid Safe Paths - Threat Modeling Part 2Covid
Creating a Scalable API Test Framework using AWS and ElasticDevSecOps2021Nov
Crowdsourcing Security TalentGovernance2022Nov
Data CultureWardley Maps2022Sep
Developing Secure Multi-Cloud Kubernetes ApplicationsKubernetes2021Nov
DevSecOps for Modern Identity and Access ManagementDevSecOps2022Sep
For bugs start with a passing test (and 99% code coverage)Owasp2021May
Hacking Glasswall SDk & Cloud - Part 2Hacking and Defending
How can we make Grafana a great open source security tool?DevSecOps2022May
How Owasp can help Security Teams - DevSecOpsOwasp2020Dec
How Owasp can help Security Teams - DevSecOps2021Jan
How Owasp can help Security Teams - Guides and Testing ToolsOwasp2020Dec
How Owasp can help Security Teams - Guides and Testing Tools2021Jan
How to become a cyber security professional? (i.e. where to start?)Education and Training2022Sep
Ideas for Graph DBs like Neo4jGovernance2022Mar
Incident Scenario ExerciseCISO and Risk Management
Jim and Dinis Talk AppsecDevSecOps2022May
Jira Schemas and Workflows for AppSec and Risk ManagementGovernance2022Jan
Learn Threat Modeling using the amazing OSS resourcesThreat Modeling2021Nov
Mentoring and it's challenges in Cyber SecurityGovernance2022Jul
Modern Office SpacesGovernance2021Apr
Moldable development with Glamorous Toolkit Part 12021Mar
Moldable development with Glamorous Toolkit Part 22021Mar
Moldable development with Glamorous Toolkit Part 32021Mar
New OSS ProjectsMisc2021Sep
Open Security Summit Membership Awards2022Jan
OSS - Celebrating the Community and plans for 20222021Nov
OSS DevSecOps projetDevSecOps2021Sep
OSS OWASP ProjectOWASP2021Sep
OSS Semgrep projectSemgrep2021Sep
OSS Threat Modeling and Moldable Development ProjectsThreat Modeling2021Sep
Owasp O2 Platform tools you can use today2021Apr
OWASP Security Bot - Hypercharge your Cloud AutomationOWASP2022Jan
Panel - Prioritizing Risks and Vulnerabilities based on ContextRisk and Governance2021Nov
Positive Security models and Rebuilding into a "Known Good" stateCDR2021May
Privacy-The Challenges in Post Tornado Cash WorldDevSecOps2022Nov
Refresher on Security LabelsSecurity Labels2020Nov
Scaling Kubernetes - One Pod per fileDevSecOps2021Jun
Scaling Threat Models visualisations using PlantUML and VisJSDevSecOps2020Dec
Schrems II - Finding workable solutionsSchrems II2020Dec
Schrems II - Finding workable solutionsSchrems II2021Jan
Security Champions - Sharing ExperiencesGovernance2022May
Security Labels & Schrems IISecurity Labels2020Nov
Successes and Failures at Security TrainingGovernance2022Sep
Testing Ephemeral Kubernetes ApplicationsDevSecOps2021Jun
The Business case for Security ChampionsGovernance2022Mar
The value of CTO/CISOs and how to make it workGovernance2022Jul
Threat Modeling - Cloud Functions as Detonation Chambers - Part 1Hacking and Defending
Threat Modeling - ICAPThreat Modeling
Threat Modeling for Schrems IIThreat Modeling2020Nov
Threat Modeling Glasswall Cloud SDKThreat Modeling2021May
Threat Modeling Glasswall DesktopThreat Modeling2020Dec
Threat Modeling Glasswall Folder-to-Folder PluginThreat Modeling2021May
Threat Modeling IntroductionThreat Modeling
Threat Modeling Using Glamorous ToolkitThreat Modeling2021May
Threat Modelling Adoption in Disciplines Other Than DevelopmentThreat Modeling2022Sep
Threat Models and Wardley MapsThreat Modeling2022Mar
Using Elastic and Kibana for Scale and Security VisualisationDevSecOps2021Nov
Using Kubernetes to create a scalable Security Proxy solutionDevSecOps2020Oct
Using Presentations instead of CVs and Creating Diverse Security TeamsGovernance2022Mar
Virtual PubMiscellenous2020Oct
Wardley Maps introductionWardley Maps
What are ISGs and how to convert ISGs into checklists?ISG
Why Wardley Maps changed how I thinkWardley Maps2022Jul
Workshop on creating C# Tools using the Owasp O2 Platform2021May

Back to list of all Participants