| Title | Track | Year | Month | 
|---|
| “Shift Left” Isn’t What You Expected | Risk and Governance | 2023 | Apr | 
| Are our users always smarter than AI? | Risk and Governance | 2023 | Jun | 
| Behaviour Change and Awareness | Risk and Governance | 2023 | Apr | 
| Cybersecurity assessments: finding the way forward | Risk and Governance | 2023 | Apr | 
| In the moment nudges – What? How? Applying nudge theory to awareness | Risk and Governance | 2023 | Jun | 
| Panel - Prioritizing Risks and Vulnerabilities based on Context | Risk and Governance | 2021 | Nov | 
| Risk Acceptance and OISRU (Panel) | Risk and Governance | 2023 | Dec | 
| The Truth about suffering a cyber-attack | Risk and Governance | 2023 | Apr | 
| Using Jira to Map and Visualise Risks | Risk and Governance | 2021 | Nov | 
| A Cyber Security Roadmap: How To? | Governance | 2022 | May | 
| A perspective on automating 3rd party risk assessment. How to free up your staff, and improve speed by automaton with guardrails. | Governance | 2021 | Apr | 
| Addressing the cyber unemployment crisis; a positive outlook | Governance | 2024 | Jun | 
| Adversary Simulation: Close the Gaps in Your Security Posture | Governance | 2022 | May | 
| Alert Readiness Framework | Governance | 2024 | Jan | 
| AMA with Adam Shostack | Threat Modeling | 2022 | Jul | 
| AMA with Alyssa Miller | Education | 2022 | Dec | 
| AMA with Brook Schoenfield | Governance | 2022 | Mar | 
| AMA with Gary McGraw | Governance | 2022 | Sep | 
| AMA with Mark Curphey | Governance | 2022 | Sep | 
| An Interactive Session on Teamwork and Collaboration Tools | Governance | 2023 | Feb | 
| Attack Surface Mapping | Governance | 2024 | Jun | 
| Automating SOC2 using Jira | Governance | 2021 | Jan | 
| Battling the coming wave, Understanding cybersecurity in 2024 | Governance | 2024 | Jan | 
| Bridging the skill gap and hiring challenges in cyber | Governance | 2022 | Jul | 
| Build state of the art SOC with Mitre Attack | Governance | 2022 | Mar | 
| Building Security Champions | Governance | 2022 | Mar | 
| Can we trust AI with our Cyber defences? | Governance | 2024 | Dec | 
| Can we trust AI with our Cyber defences? (Transcript) | Governance | 2024 | Dec | 
| CDC - Collective Defence Clusters | Governance | 2022 | May | 
| Challenges in IoT security: from infinite recommendations to a plethora of implementations | Governance | 2021 | Jun | 
| Championing Security: Scaling Security At Every Level | Governance | 2024 | March | 
| CISO Role in 2023 (Panel) | Governance | 2023 | Feb | 
| CISO Roundtable - Mar 2022 | Governance | 2022 | Mar | 
| Combatting Adversarial AI: The Role of CISOs, CTOs and the Top Management in Defending Against AI-Powered Cyberattacks(Panel) | Governance | 2024 | Dec | 
| Content Delivery & Security Association | Governance | 2021 | Sep | 
| Crowdsourcing Security Talent | Governance | 2022 | Dec | 
| CVE CWE CVSS CWSS where do I look first? | Governance | 2021 | Nov | 
| Cyber Insurance | Governance | 2022 | Sep | 
| Cyber Insurance - a deeper approach | Governance | 2022 | Dec | 
| DATA Driven approach on vulnerabilities Appsec vs Infra (Panel) | Governance | 2023 | Oct | 
| Data Integrity and Information Integrity-they are enterprise not just CISO issues | Governance | 2022 | Dec | 
| Defense in Depth Layers: Practical Security for LLMs on Google Cloud | Governance | 2024 | Sep | 
| Demystifying Risk and the Future of Vulnerability Management | Governance | 2022 | Dec | 
| Dependency Management and Supply Chain Security | Governance | 2022 | May | 
| Developer Driven Security in high-growth environments | Governance | 2023 | Feb | 
| Emerging Roles in Cybersecurity: Adapting Recruitment Strategies(Panel) | Governance | 2023 | Dec | 
| Encrypted Calendars - the need and consequences | Governance | 2020 | Dec | 
| Ethical Hacking Challenges: Evaluating Practical Skills in Selection Processes (Panel | Governance | 2024 | Feb | 
| Graph Based Vulnerability Management | Governance | 2021 | Apr | 
| Hands-on Workshop: Utilize OWASP DSOMM App to Define and Deliver Your Own Program | Governance | 2024 | Sep | 
| Hiring manager insights to secure your next security role/team member | Governance | 2022 | Sep | 
| How do male and female voices project authority in Cyber | Governance | 2022 | Jul | 
| How to overcome DNS security threats | Governance | 2022 | May | 
| Ideas for Graph DBs like Neo4j | Governance | 2022 | Mar | 
| Improving DevOps using GenAI: Understanding, Visualizing, and Optimizing | Governance | 2024 | Dec | 
| Improving Mental Health & Security Outcomes Through Flow States | Governance | 2024 | Sep | 
| Jira Schemas and Workflows for AppSec and Risk Management | Governance | 2022 | Jan | 
| Let’s go on a DATA with vulnerabilities | Governance | 2023 | Oct | 
| Leveraging Artificial Intelligence and Machine Learning in Recruitment(Panel) | Governance | 2024 | Feb | 
| Mapping Threat Intelligence: Enhancing Situational Awareness (Panel) | Governance | 2023 | Oct | 
| Mental Health in Cyber Security | Governance | 2024 | Jun | 
| Mentoring and it's challenges in Cyber Security | Governance | 2022 | Jul | 
| Micro, Mid-Range, Macro - How Gen AI Risk Breaks Us | Governance | 2024 | Jun | 
| Modern Office Spaces | Governance | 2021 | Apr | 
| OISRU - Open Information Security Risk Universe (Panel) | Governance | 2023 | Feb | 
| OWASP WrongSecrets: a journey into secret management failures | Governance | 2024 | Jan | 
| OWASP WrongSecrets: define the future challenges together | Governance | 2024 | Jan | 
| Practical approach/considerations to developing a cybersecurity program | Governance | 2022 | Dec | 
| Predicting the rise and fall of an open source project | Governance | 2022 | Jan | 
| Product Permissions - Common Pitfalls and How Not to Fall For Them | Governance | 2022 | Jul | 
| Protecting Critical Data, through the implementation of Information Security Management System to meet compliance | Governance | 2022 | Jul | 
| Quantifying Usability In Security Designs and Risk Assessments | Governance | 2022 | Dec | 
| Reciprocity: Tales of an Anthropologist in Cybersecurity | Governance | 2021 | Jun | 
| Regulatory Developments in Cybersecurity(Panel) | Governance | 2024 | Dec | 
| Resilience Engineering, Safety Science and Systems thinking - new tools for the complex world | Governance | 2022 | Jul | 
| Rise of Automotive Attacks (Panel Discussion) | Governance | 2023 | Jun | 
| Risk Communication: Bridging the Gap between Risk Professionals and Executives (Panel) | Governance | 2023 | Oct | 
| Risk treatment planning in modern tech space (Panel) | Governance | 2023 | Apr | 
| Rules & Recommendations: Are we pushing our new IoT device out correctly? | Governance | 2021 | Jun | 
| Scaling CyberSecurity teams using GenAIs and FMs | Governance | 2024 | Jun | 
| Security business enabler: How to align your security program to business goals | Governance | 2022 | Dec | 
| Security Champions - Sharing Experiences | Governance | 2022 | May | 
| Security Design & Guidance at scale | Governance | 2023 | Feb | 
| Security on autonomous systems - a long way to go | Governance | 2022 | Mar | 
| SOC2 Certification for SaaS companies | Governance | 2020 | Dec | 
| Stories of Female empowerment in Cyber Security | Governance | 2024 | Sep | 
| Successes and Failures at Security Training | Governance | 2022 | Sep | 
| Supply Chain Security: Strengthening Resilience Against Third-Party Risks(panel) | Governance | 2024 | Jun | 
| Taking responsibility for your software - How to simply monitor your solutions for known vulnerabiities and keep your customers informed | Governance | 2024 | Dec | 
| Technical Leadership and Influence | Governance | 2022 | Jan | 
| Technics to limit hallucinations when using a LLM solution like ChatGPT | Governance | 2024 | Jan | 
| The Business case for Security Champions | Governance | 2022 | Mar | 
| The challenge of auditing smart contract audit, especially ones with more advanced cryptographic primitives such as ZKP or MPC | Governance | 2022 | Jul | 
| The Challenges With DNS Security | Governance | 2022 | Feb | 
| The Cybersecurity Talent Gap: Addressing the Growing Skills Shortage(Panel) | Governance | 2023 | Oct | 
| The Human Firewall | Governance | 2022 | May | 
| The next Insider Threat isn't your staff! | Governance | 2022 | May | 
| The RATs and CATs of Risk - Graph based Risk Framework | Governance | 2021 | Apr | 
| The value of CTO/CISOs and how to make it work | Governance | 2022 | Jul | 
| Turning the Tide : How to convince Senior Management and Ownership to invest in Cybersecurity | Governance | 2024 | Jan | 
| Using GenAI to Create Personalized Cybersecurity News Feeds | Governance | 2024 | Dec | 
| Using GenAI to scale CISO's reporting workflows | Governance | 2024 | Sep | 
| Using Presentations instead of CVs and Creating Diverse Security Teams | Governance | 2022 | Mar | 
| Utilising Security Champions Product Teams | Governance | 2024 | Jan | 
| Vendor Security Management using Jira | Governance | 2021 | Jun | 
| We need second-order thinking in security | Governance | 2022 | Dec | 
| Web application's language negotiation in 2023 | Governance | 2023 | Jun | 
| What to do in preparation for a Threat Model | Governance | 2021 | May | 
| Who Goes There? Actively Detecting Intruders With Cyber Deception Tools | Governance | 2024 | Jan | 
| Women in Cyber Security: Personal experiences and how to be an Ally | Governance | 2022 | Dec | 
| Women kick off in Cybersecurity | Governance | 2023 | Apr | 
| Zero Trust Architecture: Strengthening Cloud Security Posture (Panel) | Governance | 2023 | Oct |