Secure by Scenario

This track is focused on Secure by Scenario

TitleTrackYearMonth
A perspective on automating 3rd party risk assessment. How to free up your staff, and improve speed by automaton with guardrails.2021Apr
Agile Threat Modeling with Open-Source ToolsThreat Modeling2021Jun
AI ML European regulation2021May
AMA with Jeremiah GrossmanDevSecOps2021Jan
AMA with Jim ManicoDevSecOps2021Jan
AMA with OWASP Board2021Jan
AMA with Simon WardleyWardley Maps2020Dec
ASVS User Stories creationOwasp2021
ASVS User Stories creationOwasp2021May
ASVS User Stories creationOwasp2021May
ASVS User Stories creation (part 1)2021Apr
ASVS User Stories creation (part 2)2021Apr
ASVS User Stories creation - Part 6Owasp2021Jun
ASVS User Stories creation - Part 7Owasp2021Sep
Automating SOC2 using Jira2021Jan
Bakeoff - Anti-virus vs CDR vs SandboxingContent Disarm & Reconstruction2020Jun
Beginners Threat ModelingThreat Modeling2021Jun
CDR API StandardCDR2021May
CDR Engine Standard (Part 1)CDR2020Dec
CDR Engine Standard (Part 2)CDR2021Jan
Challenges in IoT security: from infinite recommendations to a plethora of implementationsGovernance2021Jun
CISO RoundtableGovernance2021Nov
ClusterScanner DemonstrationDevSecOps2021Jul
Compliant Kubernetes - Case StudyDevSecOps2021Apr
Content Delivery & Security AssociationGovernance2021Sep
Creating 1 million kubernetes pods - Lessons learnedDevSecOps2021Apr
Creating Secure Builds of ContainersDevSecOps2020Dec
CTO RoundtableGovernance2021Nov
Distroless ContainersOwasp2021May
DSOMM News and Belts-WorkshopDevSecOps2021Sep
Embrace Secure Defaults, Block Anti-patterns, and Kill Bug Classes with SemgrepDevSecOps2020Dec
Encrypted Calendars - the need and consequencesGovernance2020Dec
For bugs start with a passing test (and 99% code coverage)Owasp2021May
Graph Based Vulnerability ManagementGovernance2021Apr
Hacking threat modelingThreat modeling2021Sep
How Owasp can help Security Teams - DevSecOps2020Dec
How Owasp can help Security Teams - DevSecOps2021Jan
How Owasp can help Security Teams - Guides and Testing Tools2020Dec
How Owasp can help Security Teams - Guides and Testing Tools2021Jan
How Variant Analysis and CodeQL helped secure the fight against COVID-19DevSecOps2021Jan
Introduction into OWASP DSOMM2021Apr
Keynote - Open Security Summit 2020Keynotes2020Jun
Managing projects using Github Issues and ZenHubOwasp2021May
Maturity Mapping: Contextualise change and learningWardley Maps2021Jan
Mitigating Risks Through Open-Source Bitcoin TracingDevSecOps2021Apr
Modern Office SpacesGovernance2021Apr
Moldable development with Glamorous Toolkit Part 12021Mar
Moldable development with Glamorous Toolkit Part 22021Mar
Moldable development with Glamorous Toolkit Part 32021Mar
New OSS Projects2021Sep
OSS DevSecOps projet2021Sep
OSS OWASP Project2021Sep
OSS Semgrep project2021Sep
OSS Threat Modeling and Moldable Development Projects2021Sep
OWASP DSOMM Enhancement WorkshopDevSecOps2021Apr
Owasp O2 Platform tools you can use today2021Apr
Playing at Security: Designing, building, and running tabletop scenarios for fail-safe incident handling and incident response trainingSecure by Scenario2020Nov
Positive Security models and Rebuilding into a "Known Good" stateCDR2021May
Pyroscope internals and Using Pyroscope for real-time view of Cloud/Serverless Applications2021Mar
Reciprocity: Tales of an Anthropologist in CybersecurityGovernance2021Jun
Refresher on Security LabelsSecurity Labels2020Nov
Remote Threat ModelingThreat Modeling2021Jan
Rules & Recommendations: Are we pushing our new IoT device out correctly?Governance2021Jun
Scaling Incident Response using Jira, Jupyter and GSuiteDevSecOps2021Jan
Scaling Kubernetes - One Pod per fileDevSecOps2021Jun
Scaling Threat Models visualisations using PlantUML and VisJSDevSecOps2020Dec
Scaling Your Security Program with SemgrepDevSecOps2021Jun
Schrems II - Finding workable solutionsSchrems II2020Dec
Schrems II - Finding workable solutionsSchrems II2021Jan
Schrems II - Transfer risk triage and other adventures in scopingSchrems II2021Mar
SDA SE Cluster Scanner is going Open SourceDevSecOps2021Mar
Secure Access to Kubernetes pods using teleportDevSecOps2021Jul
Secure By ScenarioSecure by Scenario2021Apr
Secure By ScenarioSecure by Scenario2021Jan
Secure By ScenarioSecure By Scenario2021Jun
Secure By ScenarioSecure by Scenario2021Mar
Secure By ScenarioSecure by Scenario2021May
Secure by ScenarioSecure by Scenario2020Oct
Secure by Scenario - Data breach at the North PoleSecure by Scenario2020Dec
Security Labels & Schrems IISecurity Labels2020Nov
Security-Scan your production imagesDevSecOps2021Sep
SOC2 Certification for SaaS companiesGovernance2020Dec
Sonar Cube Integrations with GitHubDevSecOps2020Dec
Spreading security across the SDLC (with semgrep and other tools)DevSecOps2021Mar
Testing Ephemeral Kubernetes ApplicationsDevSecOps2021Jun
The Modern Data Broker LandscapeGovernance2021Apr
The RATs and CATs of Risk - Graph based Risk FrameworkGovernance2021Apr
Threat Modeling for Schrems IIThreat Modeling2020Nov
Threat Modeling Glasswall Cloud SDKThreat Modeling2021May
Threat Modeling Glasswall DesktopThreat Modeling2020Dec
Threat Modeling Glasswall Folder-to-Folder PluginThreat Modeling2021May
Threat Modeling ManifestoThreat Modeling2020Dec
Threat Modeling PlaybookThreat Modeling2020Oct
Threat Modeling Using Glamorous ToolkitThreat Modeling2021May
Threats categorization, pitfalls, different ways of applying it in practiseThreat Modeling2021Jan
Using Domain Specific Languages (DSL) for testing2021Jan
Using Kubernetes to create a scalable Security Proxy solutionDevSecOps2020Oct
Using VPC Flows to monitor EC2 TrafficDevSecOps2021Apr
Vendor Security Management using JiraGovernance2021Jun
Virtual PubMiscellenous2020Oct
Wardley Maps and services model at GlasswallWardley Maps2020Dec
What to do in preparation for a Threat ModelGovernance2021May
Workshop on creating C# Tools using the Owasp O2 Platform2021May
Yor:Automated IaC tag and traceDevSecOps2021Jun