Schedule by day

Working Sessions

Working Sessions

when Monday Tuesday Wednesday Thursday Friday
Create Wardley Maps for multiple security scenarios
Creating content session
Juice Shop Hack'n'Code I
Restructure session
SAMM DevSecOps Version
API Threat Modeling Cheat Sheet
Agile Practices for Security Teams
Attack chains as TM technique
Creating content session
Cyber Insurance
Cyber Risk Modeling
DevSecOps Maturity Model (DSOMM)
Juice Shop Hack'n'Code II
OWASP Collective Defence Cluster (CDC) - two years on
Restructure session
SAMMv2 working session - Design
SAMMv2 working session - Governance
SAMMv2 working session - Implementation
Share your playbooks and release them under Creative Commons
Share your security polices and release them under CC
Using Threat Models for GDPR
Application Security Verification Standard
Creating content session
Describe different ways of implementing TM in agile organisations
Juice Shop Difficulty Calibration
Juice Shop Hack'n'Code III
SAMMv2 Establish the Document Model
SAMMv2 Measurement Model
SOC Monitoring Visualisation
Using User Story Mapping for effective communication
Azure Serverless for security
CISO Ask Me Anything (AMA)
Cell based Structures for Security
Creating content session
Cynefin Framework for Security
From Threat Modeling to DevSecOps metrics
GCP Serverless for security
Hacking ML Applications
How to scale Threat Modeling.
Integrating Security Tools in the SDL
Juice Shop Hack'n'Code IV
ML for Scaling Security Analysis
Meet the ICO
Owasp Testing Guide v5
PSD2 Security
Real world ML case-studies
SAMM benchmarking
Scaling API Security
Securing Kubernete's hosted APIs
Securing Serverless applications
Securing the CI Pipeline
Using Data Science for log analysis
Using Lambda functions to scale security teams
Using Lambda functions to scale security teams
Creating content session
Customising the Chaos Engineering Toolkit
Owasp Top 5 Machine Learning risks
Real world Chaos Engineering
Share your Threat Models diagrams and create a Book
Sessions not mapped to an day and time
  • Creating a Security Champions network
  • Creating a Threat Library
  • Creating content session
  • Restructure session

    User Sessions

    Monday Tuesday Wednesday Thursday Friday
    Create a Slack bot in Python
    Juice Shop 101
    Mobile Security Testing Guide onboarding
    SAMM - Best Practices
    SAMM Introduction
    SAMM Round Table
    Ask me anything (AMA) on GDPR
    Creating ELK Dashboards
    Juice Shop 101
    Juice Shop Contributor Onboarding
    Using Wardley maps on SOC
    Zap - How to use it
    Creating Appsec metrics and visualisation
    Juice Shop Round Table
    Juice Shop Release Night
    Using graphs for GDPR mappings and visualisations
    Using the OWASP Maturity Model tool
    Writing security tests to confirm vulnerabilities and fixes