Secure by Scenario

This track is focused on Secure by Scenario

A perspective on automating 3rd party risk assessment. How to free up your staff, and improve speed by automaton with guardrails.2021Apr
AMA with Jeremiah GrossmanDevSecOps2021Jan
AMA with Jim ManicoDevSecOps2021Jan
AMA with OWASP BoardOwasp2021Jan
AMA with Simon WardleyWardley Maps2020Dec
ASVS User Stories creation (part 1)Owasp2021Apr
ASVS User Stories creation (part 2)Owasp2021Apr
Automating SOC2 using Jira2021Jan
Bakeoff - Anti-virus vs CDR vs SandboxingContent Disarm & Reconstruction2020Jun
CDR API StandardCDR2021May
CDR Engine Standard (Part 1)CDR2020Dec
CDR Engine Standard (Part 2)CDR2021Jan
CISO RoundtableGovernance2021May
Compliant Kubernetes - Case StudyDevSecOps2021Apr
Creating 1 million kubernetes pods - Lessons learnedDevSecOps2021Apr
Creating Secure Builds of ContainersDevSecOps2020Dec
CTO RoundtableGovernance2021May
Embrace Secure Defaults, Block Anti-patterns, and Kill Bug Classes with SemgrepDevSecOps2020Dec
Encrypted Calendars - the need and consequencesGovernance2020Dec
Graph based Risk PolicyGovernance2021May
Graph Based Vulnerability ManagementGovernance2021Apr
How Owasp can help Security Teams - DevSecOpsOwasp2020Dec
How Owasp can help Security Teams - DevSecOpsOwasp2021Jan
How Owasp can help Security Teams - Guides and Testing ToolsOwasp2020Dec
How Owasp can help Security Teams - Guides and Testing ToolsOwasp2021Jan
How Variant Analysis and CodeQL helped secure the fight against COVID-19DevSecOps2021Jan
Introduction into OWASP DSOMMOwasp2021Apr
Keynote - Open Security Summit 2020Keynotes2020Jun
Maturity Mapping: Contextualise change and learningWardley Maps2021Jan
Mitigating Risks Through Open-Source Bitcoin TracingDevSecOps2021Apr
Modern Office SpacesGovernance2021Apr
Moldable development with Glamorous Toolkit Part 12021Mar
Moldable development with Glamorous Toolkit Part 22021Mar
Moldable development with Glamorous Toolkit Part 32021Mar
OWASP DSOMM Enhancement WorkshopDevSecOps2021Apr
Owasp O2 Platform tools you can use todayOwasp2021Apr
Playing at Security: Designing, building, and running tabletop scenarios for fail-safe incident handling and incident response trainingSecure by Scenario2020Nov
Positive Security models and Rebuilding into a "Known Good" stateCDR2021May
Pyroscope internals and Using Pyroscope for real-time view of Cloud/Serverless Applications2021Mar
Refresher on Security LabelsSecurity Labels2020Nov
Remote Threat ModelingThreat Modeling2021Jan
Scaling Incident Response using Jira, Jupyter and GSuiteDevSecOps2021Jan
Scaling Threat Models visualisations using PlantUML and VisJSDevSecOps2020Dec
Schrems II - Finding workable solutionsSchrems II2020Dec
Schrems II - Finding workable solutionsSchrems II2021Jan
Schrems II - Transfer risk triage and other adventures in scopingSchrems II2021Mar
SDA SE Cluster Scanner is going Open SourceDevSecOps2021Mar
Secure Access to Kubernetes pods using teleportDevSecOps2021May
Secure By ScenarioSecure by Scenario2021Apr
Secure By ScenarioSecure by Scenario2021Jan
Secure By ScenarioSecure by Scenario2021Mar
Secure by ScenarioSecure by Scenario2020Oct
Secure by Scenario - Data breach at the North PoleSecure by Scenario2020Dec
Security Labels & Schrems IISecurity Labels2020Nov
SOC2 Certification for SaaS companiesGovernance2020Dec
Sonar Cube Integrations with GitHubDevSecOps2020Dec
Spreading security across the SDLC (with semgrep and other tools)DevSecOps2021Mar
Static analysis with Owasp O2 PlatformOwasp2021May
The Modern Data Broker LandscapeGovernance2021Apr
The RATs and CATs of Risk - Graph based Risk FrameworkGovernance2021Apr
Threat Modeling for Schrems IIThreat Modeling2020Nov
Threat Modeling Glasswall DesktopThreat Modeling2020Dec
Threat Modeling ManifestoThreat Modeling2020Dec
Threat Modeling PlaybookThreat Modeling2020Oct
Threat Modeling using Glamorous ToolkitThreat Modeling2021May
Threats categorization, pitfalls, different ways of applying it in practiseThreat Modeling2021Jan
Using Domain Specific Languages (DSL) for testing2021Jan
Using Kubernetes to create a scalable Security Proxy solutionDevSecOps2020Oct
Using VPC Flows to monitor EC2 TrafficDevSecOps2021Apr
Virtual PubMiscellenous2020Oct
Wardley Mapping using Glamorous Toolkit2021May
Wardley Maps and services model at GlasswallWardley Maps2020Dec