[ { "id" : "e40eb96d1d0adb99fb0733b7839bc1f8", "file_path" : "tracks/CDR/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/tracks/cdr/", "content_plain" : "This track is focused on CDR (Content Disarm and Reconstruction)\n", "summary" : "\u003cp\u003eThis track is focused on CDR (Content Disarm and Reconstruction)\u003c/p\u003e", "title" : "CDR", "track" : null, "type" : "track", "word_count" : 10, "params" : {"description":"Sessions focusing on CDR (Content Disarm and Reconstruction)","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":"Paul Burke","owasp-project":false,"session_slack":null,"title":"CDR","type":"track","when_day":null} } , , { "id" : "162e143d81bc6a99c8bb388e3a31243e", "file_path" : "tracks/DevSecOps/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/tracks/devsecops/", "content_plain" : "This track is focused on DevSecOps\n", "summary" : "\u003cp\u003eThis track is focused on DevSecOps\u003c/p\u003e", "title" : "DevSecOps", "track" : null, "type" : "track", "word_count" : 6, "params" : {"description":"Sessions focusing on DevSecOps","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":"Petra Vukmirovic","owasp-project":false,"session_slack":null,"title":"DevSecOps","type":"track","when_day":null} } , , { "id" : "73f711faae47788d8ded5fad2353cdb2", "file_path" : "tracks/Governance/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/tracks/governance/", "content_plain" : "This track is focused on Governance\n", "summary" : "\u003cp\u003eThis track is focused on Governance\u003c/p\u003e", "title" : "Governance", "track" : null, "type" : "track", "word_count" : 6, "params" : {"description":"Sessions focusing on Governance","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":null,"owasp-project":false,"session_slack":null,"title":"Governance","type":"track","when_day":null} } , , { "id" : "01185692b30ae5e4295c0f8d627df4a0", "file_path" : "tracks/Keynotes/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/tracks/keynotes/", "content_plain" : "Keynote Sessions\n", "summary" : "\u003cp\u003eKeynote Sessions\u003c/p\u003e", "title" : "Keynotes", "track" : null, "type" : "track", "word_count" : 2, "params" : {"description":"Keynote Sessions","draft":false,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":"Open Security Summit","session_slack":null,"title":"Keynotes","type":"track","when_day":null} } , , { "id" : "42a9b1608853096360c663d3d1c3f914", "file_path" : "tracks/Owasp/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/tracks/owasp/", "content_plain" : "This track is focused on Owasp projects\n", "summary" : "\u003cp\u003eThis track is focused on Owasp projects\u003c/p\u003e", "title" : "Owasp", "track" : null, "type" : "track", "word_count" : 7, "params" : {"description":"Sessions focusing on Owasp projects","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":"Adam Leon Smith","owasp-project":false,"session_slack":null,"title":"Owasp","type":"track","when_day":null} } , , { "id" : "78c9d92b021f8426ad50b28882314fee", "file_path" : "tracks/Risks/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/tracks/risks/", "content_plain" : "This track is focused on Risks\n", "summary" : "\u003cp\u003eThis track is focused on Risks\u003c/p\u003e", "title" : "Risks", "track" : null, "type" : "track", "word_count" : 6, "params" : {"description":"Sessions focusing on Risks","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":null,"owasp-project":false,"session_slack":null,"title":"Risks","type":"track","when_day":null} } , , { "id" : "738377c01e28217f10677d2e6b102013", "file_path" : "tracks/Screms-ii/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/tracks/screms-ii/", "content_plain" : "This track is focused on Schrems II\n", "summary" : "\u003cp\u003eThis track is focused on Schrems II\u003c/p\u003e", "title" : "Schrems II", "track" : null, "type" : "track", "word_count" : 7, "params" : {"description":"Sessions focusing on Schrems II","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":"Adam Leon Smith","owasp-project":false,"session_slack":null,"title":"Schrems II","type":"track","when_day":null} } , , { "id" : "13531b424f08771b415d5b0e2c2eaabd", "file_path" : "sessions/2020/mini-summits/nov/Secure-by-Scenario/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/sessions/2020/mini-summits/nov/secure-by-scenario/", "content_plain" : "This track is focused on Secure by Scenario\n", "summary" : "\u003cp\u003eThis track is focused on Secure by Scenario\u003c/p\u003e", "title" : "Secure by Scenario", "track" : null, "type" : "track", "word_count" : 8, "params" : {"description":"Sessions focusing on Secure by Scenario","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":null,"owasp-project":false,"session_slack":null,"title":"Secure by Scenario","type":"track","when_day":null} } , { "id" : "c7d204f049784614d616b5415edad871", "file_path" : "sessions/2020/mini-summits/nov/Secure-by-Scenario/How-to-build-your-own-scenario-and-run-it.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/sessions/2020/mini-summits/nov/secure-by-scenario/how-to-build-your-own-scenario-and-run-it/", "content_plain" : "Session Description Join this session to lean how to design, build, and run tabletop scenarios for fail-safe incident handling and incident response training\n", "summary" : "\u003ch2 id=\"session-description\"\u003eSession Description\u003c/h2\u003e\n\u003cp\u003eJoin this session to lean how to design, build, and run tabletop scenarios for fail-safe incident handling and incident response training\u003c/p\u003e", "title" : "Playing at Security: Designing, building, and running tabletop scenarios for fail-safe incident handling and incident response training", "track" : "Secure by Scenario", "type" : "working-session", "word_count" : 23, "params" : {"description":"","draft":false,"event":"mini-summit","hey_summit":"https://post-summit-sessions.heysummit.com/talks/how-to-build-your-own-scenario-and-run-it/","iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":["James Bore"],"project":"Secure by Scenario","session_slack":null,"status":null,"title":"Playing at Security: Designing, building, and running tabletop scenarios for fail-safe incident handling and incident response training","topics":null,"track":"Secure by Scenario","type":"working-session","when":"Nov 9th Mon","when_day":"Mon","when_month":"Nov","when_time":"WS-6","when_week":null,"when_year":2020,"youtube_link":null,"zoom_link":"https://zoom.us/j/97434180998"} } , { "id" : "48835894ee9334933ca82ad4989f84ee", "file_path" : "tracks/Secure-by-Scenario/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/tracks/secure-by-scenario/", "content_plain" : "This track is focused on Secure by Scenario\n", "summary" : "\u003cp\u003eThis track is focused on Secure by Scenario\u003c/p\u003e", "title" : "Secure by Scenario", "track" : null, "type" : "track", "word_count" : 8, "params" : {"description":"Sessions focusing on Secure by Scenario","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":["James Bore"],"owasp-project":false,"session_slack":null,"title":"Secure by Scenario","type":"track","when_day":null} } , , { "id" : "d24bf11be454cefd817f1e524cf06b49", "file_path" : "sessions/2020/mini-summits/nov/Security-Labels/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/sessions/2020/mini-summits/nov/security-labels/", "content_plain" : "Sessions focused on exploring the concept of Security Labels\n", "summary" : "\u003cp\u003eSessions focused on exploring the concept of Security Labels\u003c/p\u003e", "title" : "Security Labels", "track" : null, "type" : "track", "word_count" : 9, "params" : {"description":"Sessions focused on exploring the concept of Security Labels","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":null,"owasp-project":false,"session_slack":null,"title":"Security Labels","type":"track","when_day":null} } , { "id" : "7c8f3b26094bb948d6178637d5f95306", "file_path" : "sessions/2020/mini-summits/nov/Security-Labels/Refresher-on-Security-Labels.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/sessions/2020/mini-summits/nov/security-labels/refresher-on-security-labels/", "content_plain" : "Session Description Following from the Security Labels for Covid Apps session at the 2020 Open Security Summit and in preparation for the Security Labels \u0026amp; Schrems II happening on Thursday this session will focus on :\nConcept of \u0026lsquo;Security Labels\u0026rsquo; and how it can be used in practice Past examples of Security Labels efforts Security Labels as a way to prevent \u0026lsquo;Markets for Lemons\u0026rsquo; Labels to use during Security Labels \u0026amp; Schrems II session References Security Labels for Covid Apps at 2020 Open Security Summit Security Labels \u0026amp; Schrems II ", "summary" : "\u003ch2 id=\"session-description\"\u003eSession Description\u003c/h2\u003e\n\u003cp\u003eFollowing from the \u003ca href=\"https://2020.open-security-summit.org/tracks/covid/security-labels-for-covid-apps\"\u003eSecurity Labels for Covid Apps\u003c/a\u003e session at the 2020 Open Security Summit\nand in preparation for the \u003ca href=\"/tracks/security-labels/security-labels-and-schrems-ii/\"\u003eSecurity Labels \u0026amp; Schrems II\u003c/a\u003e happening on Thursday\nthis session will focus on :\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003eConcept of \u0026lsquo;Security Labels\u0026rsquo; and how it can be used in practice\u003c/li\u003e\n\u003cli\u003ePast examples of Security Labels efforts\u003c/li\u003e\n\u003cli\u003eSecurity Labels as a way to prevent \u0026lsquo;Markets for Lemons\u0026rsquo;\u003c/li\u003e\n\u003cli\u003eLabels to use during \u003ca href=\"/tracks/security-labels/security-labels-and-schrems-ii/\"\u003eSecurity Labels \u0026amp; Schrems II\u003c/a\u003e session\u003c/li\u003e\n\u003c/ul\u003e\n\u003ch3 id=\"references\"\u003eReferences\u003c/h3\u003e\n\u003cul\u003e\n\u003cli\u003e\u003ca href=\"https://2020.open-security-summit.org/tracks/covid/security-labels-for-covid-apps\"\u003eSecurity Labels for Covid Apps\u003c/a\u003e at 2020 Open Security Summit\u003c/li\u003e\n\u003cli\u003e\u003ca href=\"/tracks/security-labels/security-labels-and-schrems-ii/\"\u003eSecurity Labels \u0026amp; Schrems II\u003c/a\u003e\u003c/li\u003e\n\u003c/ul\u003e", "title" : "Refresher on Security Labels", "track" : "Security Labels", "type" : "working-session", "word_count" : 90, "params" : {"description":"","draft":false,"event":"mini-summit","hey_summit":"https://post-summit-sessions.heysummit.com/talks/refresher-on-security-labels/","iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":["Dinis Cruz","James Bore","David Clarke","Adam Leon Smith"],"project":"Miscellaneous","session_slack":null,"status":null,"title":"Refresher on Security Labels","topics":null,"track":"Security Labels","type":"working-session","when":"Nov 10th Tuesday","when_day":"Tue","when_month":"Nov","when_time":"WS-6","when_week":null,"when_year":2020,"youtube_link":null,"zoom_link":"https://zoom.us/j/96274685715"} } , { "id" : "4de930150cf0ee3d7cef77f4d889539f", "file_path" : "sessions/2020/mini-summits/nov/Security-Labels/Security-Labels-And-Schrems-II.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/sessions/2020/mini-summits/nov/security-labels/security-labels-and-schrems-ii/", "content_plain" : "Session Description As per the Schrems II ruling the US is no longer an adequate country for EU personal data. BCS recently did a recent webinar on the legal aspects here [https://www.bcs.org/content-hub/webinar-what-do-you-need-to-know-about-schrems-ii/].\nSo far, the ICO guidance in the UK is to map your data flows in preparation for further guidance. To help companies with this, this working session will be a joint event between the Open Security Summit and the BCS focussed on the data flows. We\u0026rsquo;ll be combining the legal aspects, with data labelling and threat modelling techniques, to produce an interactive event.\nWe\u0026rsquo;ll be discussing two key uses case (a) the use of US cloud providers for email services and (b) the use of US cloud providers for infrastructure.\nReferences Before joining this talk, listen to these previous talks:\nhttps://www.bcs.org/content-hub/webinar-what-do-you-need-to-know-about-schrems-ii/ https://2020.open-security-summit.org/tracks/covid/security-labels-for-covid-apps/ Security Labels for Covid Apps working session at 2020 Open Security Summit Related to Threat Modeling for Schrems II Refresher on Security Labels working session at 2020 Open Security Summit ", "summary" : "\u003ch2 id=\"session-description\"\u003eSession Description\u003c/h2\u003e\n\u003cp\u003eAs per the Schrems II ruling the US is no longer an adequate country for EU personal data.\nBCS recently did a recent webinar on the legal aspects here [https://www.bcs.org/content-hub/webinar-what-do-you-need-to-know-about-schrems-ii/].\u003c/p\u003e\n\u003cp\u003eSo far, the ICO guidance in the UK is to map your data flows in preparation for further guidance.\nTo help companies with this, this working session will be a joint event between the Open Security Summit\nand the BCS focussed on the data flows. We\u0026rsquo;ll be combining the legal aspects,\nwith data labelling and threat modelling techniques, to produce an interactive event.\u003c/p\u003e", "title" : "Security Labels \u0026 Schrems II", "track" : "Security Labels", "type" : "working-session", "word_count" : 164, "params" : {"description":"","draft":false,"event":"mini-summit","hey_summit":"https://post-summit-sessions.heysummit.com/talks/main-session-security-labels-schrems-ii/","iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":["Dinis Cruz","James Bore","David Clarke","Adam Leon Smith"],"project":"Miscellaneous","session_slack":null,"status":null,"title":"Security Labels \u0026 Schrems II","topics":null,"track":"Security Labels","type":"working-session","when":"Nov 12th Thursday","when_day":"Thu","when_month":"Nov","when_time":"WS-6","when_year":2020,"youtube_link":null,"zoom_link":"https://zoom.us/j/92869175092"} } , { "id" : "fb66e06059628e62d3b60792e142632b", "file_path" : "tracks/Semgrep/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/tracks/semgrep/", "content_plain" : "This track is focused on Semgrep\n", "summary" : "\u003cp\u003eThis track is focused on Semgrep\u003c/p\u003e", "title" : "Semgrep", "track" : null, "type" : "track", "word_count" : 6, "params" : {"description":"Sessions focusing on Semgrep","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":null,"owasp-project":false,"session_slack":null,"title":"Semgrep","type":"track","when_day":null} } , , { "id" : "6abbbf1feaff5e49c3f502901425a984", "file_path" : "sessions/2020/mini-summits/nov/Threat-Modeling/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/sessions/2020/mini-summits/nov/threat-modeling/", "content_plain" : "This track is focused on Threat Modeling Playbook\n", "summary" : "\u003cp\u003eThis track is focused on Threat Modeling Playbook\u003c/p\u003e", "title" : "Threat Modeling", "track" : null, "type" : "track", "word_count" : 8, "params" : {"description":"Sessions focusing on Threat Modeling Playbook","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":null,"owasp-project":false,"session_slack":null,"title":"Threat Modeling","type":"track","when_day":null} } , { "id" : "32abb28f53182aff452ca5f5c23d6d61", "file_path" : "sessions/2020/mini-summits/nov/Threat-Modeling/threat-modeling-for-schrems-II.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/sessions/2020/mini-summits/nov/threat-modeling/threat-modeling-for-schrems-ii/", "content_plain" : "Session Description In preparation for the Security Labels \u0026amp; Schrems II session that is happening on Thursday, in this session we will be executing a Threat Model exercise aimed at mapping out the multiple Threat Modeling components of the scenarios affected by \u0026ldquo;Schrems II\u0026rdquo; (Threat Actors, Data Flows, Use Cases, Security Boundaries, Vulnerabilities and Risks)\nSchrems II As per the Schrems II ruling, the US is no longer an adequate country for EU personal data. BCS recently did a recent webinar on the legal aspects which you can see here\nSo far, the ICO guidance in the UK is to map your data flows in preparation for further guidance.\nSee also:\nWebinar: What do you need to know about Schrems II? Updated ICO statement on the judgment of the European Court of Justice in the Schrems II case. JUDGMENT OF THE COURT (Grand Chamber) Related to Security Labels \u0026amp; Schrems II ", "summary" : "\u003ch2 id=\"session-description\"\u003eSession Description\u003c/h2\u003e\n\u003cp\u003eIn preparation for the \u003ca href=\"/tracks/security-labels/security-labels-and-schrems-ii/\"\u003eSecurity Labels \u0026amp; Schrems II\u003c/a\u003e\nsession that is happening on Thursday, in this session we will be executing a Threat Model exercise aimed at\nmapping out the multiple Threat Modeling components of the scenarios affected by \u0026ldquo;Schrems II\u0026rdquo; (Threat Actors,\nData Flows, Use Cases, Security Boundaries, Vulnerabilities and Risks)\u003c/p\u003e\n\u003ch3 id=\"schrems-ii\"\u003eSchrems II\u003c/h3\u003e\n\u003cp\u003eAs per the Schrems II ruling, the US is no longer an adequate country for EU personal data.\nBCS recently did a recent webinar on the legal aspects which you can see \u003ca href=\"https://www.bcs.org/content-hub/webinar-what-do-you-need-to-know-about-schrems-ii/\"\u003ehere\u003c/a\u003e\u003c/p\u003e", "title" : "Threat Modeling for Schrems II", "track" : "Threat Modeling", "type" : "working-session", "word_count" : 151, "params" : {"description":"","draft":false,"event":"mini-summit","hey_summit":"https://post-summit-sessions.heysummit.com/talks/threat-modeling-for-schrems-ii/","iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":["Dinis Cruz","James Bore","David Clarke"],"project":"Threat Modeling","session_slack":null,"status":"partials/admin/social/day.html","title":"Threat Modeling for Schrems II","topics":null,"track":"Threat Modeling","type":"working-session","when":"Nov 11th Wednesday","when_day":"Wed","when_month":"Nov","when_time":"WS-6","when_year":2020,"youtube_link":null,"zoom_link":"https://zoom.us/j/92529010689"} } , { "id" : "4fdbf127d26b7852bb6bd0580c29d92f", "file_path" : "tracks/Threat-Modeling/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/tracks/threat-modeling/", "content_plain" : "This track is focused on Threat Modeling\n", "summary" : "\u003cp\u003eThis track is focused on Threat Modeling\u003c/p\u003e", "title" : "Threat Modeling", "track" : null, "type" : "track", "word_count" : 7, "params" : {"description":"Sessions focusing on Threat Modeling","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":null,"owasp-project":false,"session_slack":null,"title":"Threat Modeling","type":"track","when_day":null} } , , { "id" : "3bacd17cc74e44ac76f1dd7c69306a55", "file_path" : "tracks/Wardley-Maps/_index.md", "last_modified" : "2025-07-09T16:44:37+01:00", "link" : "https://open-security-summit.org/tracks/wardley-maps/", "content_plain" : "This track is focused on Wardley Maps\n", "summary" : "\u003cp\u003eThis track is focused on Wardley Maps\u003c/p\u003e", "title" : "Wardley Maps", "track" : null, "type" : "track", "word_count" : 7, "params" : {"description":"Sessions focusing on Wardley Maps","draft":false,"featured":true,"iscjklanguage":false,"lastmod":"2025-07-09T16:44:37+01:00","organizers":null,"owasp-project":false,"session_slack":null,"title":"Wardley Maps","type":"track","when_day":null} } , ]