Title | Track | Year | Month |
---|
“Shift Left” Isn’t What You Expected | Risk and Governance | 2023 | Apr |
Are our users always smarter than AI? | Risk and Governance | 2023 | Jun |
Behaviour Change and Awareness | Risk and Governance | 2023 | Apr |
Cybersecurity assessments: finding the way forward | Risk and Governance | 2023 | Apr |
In the moment nudges – What? How? Applying nudge theory to awareness | Risk and Governance | 2023 | Jun |
Panel - Prioritizing Risks and Vulnerabilities based on Context | Risk and Governance | 2021 | Nov |
Risk Acceptance and OISRU (Panel) | Risk and Governance | 2023 | Dec |
The Truth about suffering a cyber-attack | Risk and Governance | 2023 | Apr |
Using Jira to Map and Visualise Risks | Risk and Governance | 2021 | Nov |
A Cyber Security Roadmap: How To? | Governance | 2022 | May |
A perspective on automating 3rd party risk assessment. How to free up your staff, and improve speed by automaton with guardrails. | Governance | 2021 | Apr |
Addressing the cyber unemployment crisis; a positive outlook | Governance | 2024 | Jun |
Adversary Simulation: Close the Gaps in Your Security Posture | Governance | 2022 | May |
Alert Readiness Framework | Governance | 2024 | Jan |
AMA with Adam Shostack | Threat Modeling | 2022 | Jul |
AMA with Alyssa Miller | Education | 2022 | Dec |
AMA with Brook Schoenfield | Governance | 2022 | Mar |
AMA with Gary McGraw | Governance | 2022 | Sep |
AMA with Mark Curphey | Governance | 2022 | Sep |
An Interactive Session on Teamwork and Collaboration Tools | Governance | 2023 | Feb |
Attack Surface Mapping | Governance | 2024 | Jun |
Automating SOC2 using Jira | Governance | 2021 | Jan |
Battling the coming wave, Understanding cybersecurity in 2024 | Governance | 2024 | Jan |
Bridging the skill gap and hiring challenges in cyber | Governance | 2022 | Jul |
Build state of the art SOC with Mitre Attack | Governance | 2022 | Mar |
Building Security Champions | Governance | 2022 | Mar |
Can we trust AI with our Cyber defences? | Governance | 2024 | Dec |
Can we trust AI with our Cyber defences? (Transcript) | Governance | 2024 | Dec |
CDC - Collective Defence Clusters | Governance | 2022 | May |
Challenges in IoT security: from infinite recommendations to a plethora of implementations | Governance | 2021 | Jun |
Championing Security: Scaling Security At Every Level | Governance | 2024 | March |
CISO Role in 2023 (Panel) | Governance | 2023 | Feb |
CISO Roundtable - Mar 2022 | Governance | 2022 | Mar |
Combatting Adversarial AI: The Role of CISOs, CTOs and the Top Management in Defending Against AI-Powered Cyberattacks(Panel) | Governance | 2024 | Dec |
Content Delivery & Security Association | Governance | 2021 | Sep |
Crowdsourcing Security Talent | Governance | 2022 | Dec |
CVE CWE CVSS CWSS where do I look first? | Governance | 2021 | Nov |
Cyber Insurance | Governance | 2022 | Sep |
Cyber Insurance - a deeper approach | Governance | 2022 | Dec |
DATA Driven approach on vulnerabilities Appsec vs Infra (Panel) | Governance | 2023 | Oct |
Data Integrity and Information Integrity-they are enterprise not just CISO issues | Governance | 2022 | Dec |
Defense in Depth Layers: Practical Security for LLMs on Google Cloud | Governance | 2024 | Sep |
Demystifying Risk and the Future of Vulnerability Management | Governance | 2022 | Dec |
Dependency Management and Supply Chain Security | Governance | 2022 | May |
Developer Driven Security in high-growth environments | Governance | 2023 | Feb |
Emerging Roles in Cybersecurity: Adapting Recruitment Strategies(Panel) | Governance | 2023 | Dec |
Encrypted Calendars - the need and consequences | Governance | 2020 | Dec |
Ethical Hacking Challenges: Evaluating Practical Skills in Selection Processes (Panel | Governance | 2024 | Feb |
Graph Based Vulnerability Management | Governance | 2021 | Apr |
Hands-on Workshop: Utilize OWASP DSOMM App to Define and Deliver Your Own Program | Governance | 2024 | Sep |
Hiring manager insights to secure your next security role/team member | Governance | 2022 | Sep |
How do male and female voices project authority in Cyber | Governance | 2022 | Jul |
How to overcome DNS security threats | Governance | 2022 | May |
Ideas for Graph DBs like Neo4j | Governance | 2022 | Mar |
Improving DevOps using GenAI: Understanding, Visualizing, and Optimizing | Governance | 2024 | Dec |
Improving Mental Health & Security Outcomes Through Flow States | Governance | 2024 | Sep |
Jira Schemas and Workflows for AppSec and Risk Management | Governance | 2022 | Jan |
Let’s go on a DATA with vulnerabilities | Governance | 2023 | Oct |
Leveraging Artificial Intelligence and Machine Learning in Recruitment(Panel) | Governance | 2024 | Feb |
Mapping Threat Intelligence: Enhancing Situational Awareness (Panel) | Governance | 2023 | Oct |
Mental Health in Cyber Security | Governance | 2024 | Jun |
Mentoring and it's challenges in Cyber Security | Governance | 2022 | Jul |
Micro, Mid-Range, Macro - How Gen AI Risk Breaks Us | Governance | 2024 | Jun |
Modern Office Spaces | Governance | 2021 | Apr |
OISRU - Open Information Security Risk Universe (Panel) | Governance | 2023 | Feb |
OWASP WrongSecrets: a journey into secret management failures | Governance | 2024 | Jan |
OWASP WrongSecrets: define the future challenges together | Governance | 2024 | Jan |
Practical approach/considerations to developing a cybersecurity program | Governance | 2022 | Dec |
Predicting the rise and fall of an open source project | Governance | 2022 | Jan |
Product Permissions - Common Pitfalls and How Not to Fall For Them | Governance | 2022 | Jul |
Protecting Critical Data, through the implementation of Information Security Management System to meet compliance | Governance | 2022 | Jul |
Quantifying Usability In Security Designs and Risk Assessments | Governance | 2022 | Dec |
Reciprocity: Tales of an Anthropologist in Cybersecurity | Governance | 2021 | Jun |
Regulatory Developments in Cybersecurity(Panel) | Governance | 2024 | Dec |
Resilience Engineering, Safety Science and Systems thinking - new tools for the complex world | Governance | 2022 | Jul |
Rise of Automotive Attacks (Panel Discussion) | Governance | 2023 | Jun |
Risk Communication: Bridging the Gap between Risk Professionals and Executives (Panel) | Governance | 2023 | Oct |
Risk treatment planning in modern tech space (Panel) | Governance | 2023 | Apr |
Rules & Recommendations: Are we pushing our new IoT device out correctly? | Governance | 2021 | Jun |
Scaling CyberSecurity teams using GenAIs and FMs | Governance | 2024 | Jun |
Security business enabler: How to align your security program to business goals | Governance | 2022 | Dec |
Security Champions - Sharing Experiences | Governance | 2022 | May |
Security Design & Guidance at scale | Governance | 2023 | Feb |
Security on autonomous systems - a long way to go | Governance | 2022 | Mar |
SOC2 Certification for SaaS companies | Governance | 2020 | Dec |
Stories of Female empowerment in Cyber Security | Governance | 2024 | Sep |
Successes and Failures at Security Training | Governance | 2022 | Sep |
Supply Chain Security: Strengthening Resilience Against Third-Party Risks(panel) | Governance | 2024 | Jun |
Taking responsibility for your software - How to simply monitor your solutions for known vulnerabiities and keep your customers informed | Governance | 2024 | Dec |
Technical Leadership and Influence | Governance | 2022 | Jan |
Technics to limit hallucinations when using a LLM solution like ChatGPT | Governance | 2024 | Jan |
The Business case for Security Champions | Governance | 2022 | Mar |
The challenge of auditing smart contract audit, especially ones with more advanced cryptographic primitives such as ZKP or MPC | Governance | 2022 | Jul |
The Challenges With DNS Security | Governance | 2022 | Feb |
The Cybersecurity Talent Gap: Addressing the Growing Skills Shortage(Panel) | Governance | 2023 | Oct |
The Human Firewall | Governance | 2022 | May |
The next Insider Threat isn't your staff! | Governance | 2022 | May |
The RATs and CATs of Risk - Graph based Risk Framework | Governance | 2021 | Apr |
The value of CTO/CISOs and how to make it work | Governance | 2022 | Jul |
Turning the Tide : How to convince Senior Management and Ownership to invest in Cybersecurity | Governance | 2024 | Jan |
Using GenAI to Create Personalized Cybersecurity News Feeds | Governance | 2024 | Dec |
Using GenAI to scale CISO's reporting workflows | Governance | 2024 | Sep |
Using Presentations instead of CVs and Creating Diverse Security Teams | Governance | 2022 | Mar |
Utilising Security Champions Product Teams | Governance | 2024 | Jan |
Vendor Security Management using Jira | Governance | 2021 | Jun |
We need second-order thinking in security | Governance | 2022 | Dec |
Web application's language negotiation in 2023 | Governance | 2023 | Jun |
What to do in preparation for a Threat Model | Governance | 2021 | May |
Who Goes There? Actively Detecting Intruders With Cyber Deception Tools | Governance | 2024 | Jan |
Women in Cyber Security: Personal experiences and how to be an Ally | Governance | 2022 | Dec |
Women kick off in Cybersecurity | Governance | 2023 | Apr |
Zero Trust Architecture: Strengthening Cloud Security Posture (Panel) | Governance | 2023 | Oct |