Risk and Governance - go to homepage
Toggle Navigation
Search
Projects
Schedule
Members
Past Summits
Sep 2024
Jun 2024
Jan 2024
Oct 2023
Jun 2023
Apr 2023
Feb 2023
Dec 2022
Sep 2022
Jul 2022
May 2022
Mar 2022
Jan 2022
Nov 2021
Sep 2021
Jun 2021
May 2021
Apr 2021
Mar 2021
Jan 2021
Dec 2020
Nov 2020
Oct 2020
Future Summits
Dec 2024
Mar 2025
About
The Summit
Faq
Sponsors
Project
Risk and Governance
Project focused on multiple Risk and Governance topics
Highlight Videos
Project Sessions
Title
Track
Year
Month
“Shift Left” Isn’t What You Expected
Risk and Governance
2023
Apr
Are our users always smarter than AI?
Risk and Governance
2023
Jun
Behaviour Change and Awareness
Risk and Governance
2023
Apr
Cybersecurity assessments: finding the way forward
Risk and Governance
2023
Apr
In the moment nudges – What? How? Applying nudge theory to awareness
Risk and Governance
2023
Jun
Panel - Prioritizing Risks and Vulnerabilities based on Context
Risk and Governance
2021
Nov
Risk Acceptance and OISRU (Panel)
Risk and Governance
2023
Dec
The Truth about suffering a cyber-attack
Risk and Governance
2023
Apr
Using Jira to Map and Visualise Risks
Risk and Governance
2021
Nov
A Cyber Security Roadmap: How To?
Governance
2022
May
A perspective on automating 3rd party risk assessment. How to free up your staff, and improve speed by automaton with guardrails.
Governance
2021
Apr
Addressing the cyber unemployment crisis; a positive outlook
Governance
2024
Jun
Adversary Simulation: Close the Gaps in Your Security Posture
Governance
2022
May
Alert Readiness Framework
Governance
2024
Jan
AMA with Adam Shostack
Threat Modeling
2022
Jul
AMA with Alyssa Miller
Education
2022
Dec
AMA with Brook Schoenfield
Governance
2022
Mar
AMA with Gary McGraw
Governance
2022
Sep
AMA with Mark Curphey
Governance
2022
Sep
An Interactive Session on Teamwork and Collaboration Tools
Governance
2023
Feb
Attack Surface Mapping
Governance
2024
Jun
Automating SOC2 using Jira
Governance
2021
Jan
Battling the coming wave, Understanding cybersecurity in 2024
Governance
2024
Jan
Bridging the skill gap and hiring challenges in cyber
Governance
2022
Jul
Build state of the art SOC with Mitre Attack
Governance
2022
Mar
Building Security Champions
Governance
2022
Mar
Can we trust AI with our Cyber defences?
Governance
2024
Dec
CDC - Collective Defence Clusters
Governance
2022
May
Challenges in IoT security: from infinite recommendations to a plethora of implementations
Governance
2021
Jun
Championing Security: Scaling Security At Every Level
Governance
2024
March
CISO Role in 2023 (Panel)
Governance
2023
Feb
CISO Roundtable - Mar 2022
Governance
2022
Mar
Content Delivery & Security Association
Governance
2021
Sep
Crowdsourcing Security Talent
Governance
2022
Dec
CVE CWE CVSS CWSS where do I look first?
Governance
2021
Nov
Cyber Insurance
Governance
2022
Sep
Cyber Insurance - a deeper approach
Governance
2022
Dec
DATA Driven approach on vulnerabilities Appsec vs Infra (Panel)
Governance
2023
Oct
Data Integrity and Information Integrity-they are enterprise not just CISO issues
Governance
2022
Dec
Defense in Depth Layers: Practical Security for LLMs on Google Cloud
Governance
2024
Sep
Demystifying Risk and the Future of Vulnerability Management
Governance
2022
Dec
Dependency Management and Supply Chain Security
Governance
2022
May
Developer Driven Security in high-growth environments
Governance
2023
Feb
Emerging Roles in Cybersecurity: Adapting Recruitment Strategies(Panel)
Governance
2023
Dec
Encrypted Calendars - the need and consequences
Governance
2020
Dec
Ethical Hacking Challenges: Evaluating Practical Skills in Selection Processes (Panel
Governance
2024
Feb
Graph Based Vulnerability Management
Governance
2021
Apr
Hands-on Workshop: Utilize OWASP DSOMM App to Define and Deliver Your Own Program
Governance
2024
Sep
Hiring manager insights to secure your next security role/team member
Governance
2022
Sep
How do male and female voices project authority in Cyber
Governance
2022
Jul
How to overcome DNS security threats
Governance
2022
May
Ideas for Graph DBs like Neo4j
Governance
2022
Mar
Improving Mental Health & Security Outcomes Through Flow States
Governance
2024
Sep
Jira Schemas and Workflows for AppSec and Risk Management
Governance
2022
Jan
Let’s go on a DATA with vulnerabilities
Governance
2023
Oct
Leveraging Artificial Intelligence and Machine Learning in Recruitment(Panel)
Governance
2024
Feb
Mapping Threat Intelligence: Enhancing Situational Awareness (Panel)
Governance
2023
Oct
Mental Health in Cyber Security
Governance
2024
Jun
Mentoring and it's challenges in Cyber Security
Governance
2022
Jul
Micro, Mid-Range, Macro - How Gen AI Risk Breaks Us
Governance
2024
Jun
Modern Office Spaces
Governance
2021
Apr
OISRU - Open Information Security Risk Universe (Panel)
Governance
2023
Feb
OWASP WrongSecrets: a journey into secret management failures
Governance
2024
Jan
OWASP WrongSecrets: define the future challenges together
Governance
2024
Jan
Practical approach/considerations to developing a cybersecurity program
Governance
2022
Dec
Predicting the rise and fall of an open source project
Governance
2022
Jan
Product Permissions - Common Pitfalls and How Not to Fall For Them
Governance
2022
Jul
Protecting Critical Data, through the implementation of Information Security Management System to meet compliance
Governance
2022
Jul
Quantifying Usability In Security Designs and Risk Assessments
Governance
2022
Dec
Ransomware Resilience: Strategies for Prevention and Recovery(panel)
Governance
2024
Dec
Reciprocity: Tales of an Anthropologist in Cybersecurity
Governance
2021
Jun
Resilience Engineering, Safety Science and Systems thinking - new tools for the complex world
Governance
2022
Jul
Rise of Automotive Attacks (Panel Discussion)
Governance
2023
Jun
Risk Communication: Bridging the Gap between Risk Professionals and Executives (Panel)
Governance
2023
Oct
Risk treatment planning in modern tech space (Panel)
Governance
2023
Apr
Rules & Recommendations: Are we pushing our new IoT device out correctly?
Governance
2021
Jun
Scaling CyberSecurity teams using GenAIs and FMs
Governance
2024
Jun
Security business enabler: How to align your security program to business goals
Governance
2022
Dec
Security Champions - Sharing Experiences
Governance
2022
May
Security Design & Guidance at scale
Governance
2023
Feb
Security on autonomous systems - a long way to go
Governance
2022
Mar
SOC2 Certification for SaaS companies
Governance
2020
Dec
Stories of Female empowerment in Cyber Security
Governance
2024
Sep
Successes and Failures at Security Training
Governance
2022
Sep
Supply Chain Security: Strengthening Resilience Against Third-Party Risks(panel)
Governance
2024
Jun
Taking responsibility for your software - How to simply monitor your solutions for known vulnerabiities and keep your customers informed
Governance
2024
Dec
Technical Leadership and Influence
Governance
2022
Jan
Technics to limit hallucinations when using a LLM solution like ChatGPT
Governance
2024
Jan
The Business case for Security Champions
Governance
2022
Mar
The challenge of auditing smart contract audit, especially ones with more advanced cryptographic primitives such as ZKP or MPC
Governance
2022
Jul
The Challenges With DNS Security
Governance
2022
Feb
The Cybersecurity Talent Gap: Addressing the Growing Skills Shortage(Panel)
Governance
2023
Oct
The Human Firewall
Governance
2022
May
The next Insider Threat isn't your staff!
Governance
2022
May
The RATs and CATs of Risk - Graph based Risk Framework
Governance
2021
Apr
The value of CTO/CISOs and how to make it work
Governance
2022
Jul
Turning the Tide : How to convince Senior Management and Ownership to invest in Cybersecurity
Governance
2024
Jan
Using GenAI to scale CISO's reporting workflows
Governance
2024
Sep
Using Presentations instead of CVs and Creating Diverse Security Teams
Governance
2022
Mar
Utilising Security Champions Product Teams
Governance
2024
Jan
Vendor Security Management using Jira
Governance
2021
Jun
We need second-order thinking in security
Governance
2022
Dec
Web application's language negotiation in 2023
Governance
2023
Jun
What to do in preparation for a Threat Model
Governance
2021
May
Who Goes There? Actively Detecting Intruders With Cyber Deception Tools
Governance
2024
Jan
Women in Cyber Security: Personal experiences and how to be an Ally
Governance
2022
Dec
Women kick off in Cybersecurity
Governance
2023
Apr
Zero Trust Architecture: Strengthening Cloud Security Posture (Panel)
Governance
2023
Oct
Sponsored by
Become a sponsor
Active Members
Alan Jenkins
Dinis Cruz
Avi Douglen
Aaron Rinehart
Didar Gelici
Back to list of Projects