DevSecOps - go to homepage
Toggle Navigation
Search
Projects
Schedule
Members
Past Summits
Sep 2024
Jun 2024
Jan 2024
Oct 2023
Jun 2023
Apr 2023
Feb 2023
Dec 2022
Sep 2022
Jul 2022
May 2022
Mar 2022
Jan 2022
Nov 2021
Sep 2021
Jun 2021
May 2021
Apr 2021
Mar 2021
Jan 2021
Dec 2020
Nov 2020
Oct 2020
Future Summits
Dec 2024
Mar 2025
About
The Summit
Faq
Sponsors
DevSecOps
tracks
This track is focused on DevSecOps
All DevSecOps Sessions
Title
Track
Year
Month
A call for Metrics
DevSecOps
2024
Jan
A workshop on DAST and how to put it into your pipeline
DevSecOps
2022
May
Abuse Tests for Developers
DevSecOps
2022
Jan
AI and AppSec: are we finally on the verge of the big breakthrough?
DevSecOps
2024
Dec
AMA with Jeremiah Grossman
DevSecOps
2021
Jan
AMA with Jim Manico
DevSecOps
2021
Jan
An AppSec guide to practical cryptography
DevSecOps
2023
Feb
Anticipating the Future: Strengthening App Security through Developer-Centric Foresight
DevSecOps
2023
Oct
API Security by Design
DevSecOps
2024
Jan
Application Security vulnerabilities - measurements, maturity magicĀ - Vulnerability Framework Project
DevSecOps
2023
Apr
Applying Zero Trust Principles to OT/ICS (Operational Technology & Industrial Control Systems)
DevSecOps
2022
Jul
AppSec Threats Deserve Their Own Incident Response Plan
DevSecOps
2023
Oct
AppSec Trending & recommendations:Fixing Security in Cloud & Appsec
DevSecOps
2022
May
AttackGen: Harnessing Language Models for Cybersecurity Simulations
DevSecOps
2023
Oct
Automation and scale with OWASP ZAP
DevSecOps
2022
Dec
AWS Security Hub (Panel)
DevSecOps
2023
Feb
Beat Alert Fatigue with Cyber Asset Relationship Graphs
DevSecOps
2022
May
ChatGPT and GenAI Privacy - Massive Uncertainty and Massive Opportunity
DevSecOps
2023
Oct
Check out their (lateral) moves! The importance of blast radius in DevSecOps
DevSecOps
2021
Nov
Cloud-Native Security Tools: Enhancing Cloud Protection Capabilities(Panel)
DevSecOps
2023
Oct
Compliant Kubernetes - Case Study
DevSecOps
2021
Apr
Context is king; Prioritization is queen, and CVSS is dead
DevSecOps
2022
Dec
Continuous Access Control with OPAL and Cedar
DevSecOps
2023
Jun
Cooking the perfect docker container for a react app Part 2
DevSecOps
2022
Jan
Creating 1 million kubernetes pods - Lessons learned
DevSecOps
2021
Apr
Creating a Scalable API Test Framework using AWS and Elastic
DevSecOps
2021
Nov
Creating Secure Builds of Containers
DevSecOps
2020
Dec
Creating the GenAI Athena Bot from the theCyberboardroom.com
DevSecOps
2023
Oct
CVSS, CVE, Vulnerabilities and the land of broken dreams
DevSecOps
2022
Sep
DAST - Dynamic Analysis integration lab
DevSecOps
Dependency scanning lab
DevSecOps
DevSecOps beyond CI/CD pipelines
DevSecOps
2022
Sep
DevSecOps for Modern Identity and Access Management
DevSecOps
2022
Sep
DevSecOps Maturity Model Updates
DevSecOps
2023
Oct
Docker For Security Professionals
DevSecOps
2022
May
Doing Compliance Differently: Policies as Code, Evidence-based compliance through automation
DevSecOps
2022
Mar
DSOMM News and Belts-Workshop
DevSecOps
2021
Sep
Embrace Secure Defaults, Block Anti-patterns, and Kill Bug Classes with Semgrep
DevSecOps
2020
Dec
Fundamentals of Cloud Security, Threat Identification, AWS Services
DevSecOps
2022
Jan
GitHub Actions & code scanning with CodeQL
DevSecOps
Going Multicloud: Securing Human and Service Identities in AWS vs Azure
DevSecOps
2021
Nov
Hack your own app!
DevSecOps
2022
May
How can we make Grafana a great open source security tool?
DevSecOps
2022
May
How GenAI Agents will Dramatically Change our Industry
DevSecOps
2023
Oct
How to Operate a Secure Kubernetes platform
DevSecOps
2023
Feb
How Variant Analysis and CodeQL helped secure the fight against COVID-19
DevSecOps
2021
Jan
How we build a security automation software utilizing open-source components (Betterscan.io)
DevSecOps
2023
Feb
Infrastructure scan & Encryption
DevSecOps
IoT and Cyber Threat Intelligence: Staying Ahead of the Curve (Panel)
DevSecOps
2024
Feb
Jim and Dinis Talk Appsec
DevSecOps
2022
May
Jira-Jupyter integration introduction
DevSecOps
Kubernetes Security
DevSecOps
2022
May
Lessons learned from trying to create Architecture Diagrams As Code
DevSecOps
2022
Mar
LGTM in action
DevSecOps
Linux (kernel) containerization without Docker/runc/OCI
DevSecOps
2023
April
Living off the Land & Fileless Attacks - Move Beyond the "Known Bad"
DevSecOps
2022
Dec
Low-code access control: Making the complex world of permissions approachable to everyone
DevSecOps
2022
Dec
Mitigating Risks Through Open-Source Bitcoin Tracing
DevSecOps
2021
Apr
Open Policy Agent
DevSecOps
2022
Dec
Open Security Control Testing at Scale
DevSecOps
2022
Mar
Open source modern access control
DevSecOps
2022
May
OSS DevSecOps projet
DevSecOps
2021
Sep
Overview of the new DSOMM Application
DevSecOps
2022
Sep
OWASP DSOMM Enhancement Workshop
DevSecOps
2021
Apr
OWASP Top Ten Part 2
DevSecOps
2022
Mar
Owning AppSec Automation with Python
DevSecOps
Parsec-Hardware security at your fingertips
DevSecOps
2022
Mar
Permission Models As Code - Securing the Entire Stack
DevSecOps
2022
Sep
Privacy As Code: Open-Source Developer Tools For Data Privacy
DevSecOps
2022
Jan
Privacy-The Challenges in Post Tornado Cash World
DevSecOps
2022
Dec
Protect Your Application, Not Just the Network. Add Zero Trust Superpowers to Your Critical Applications and Systems
DevSecOps
2023
Oct
Purple Teaming with OWASP PurpleTeam
DevSecOps
2022
Mar
Ransomware Resilience: Strategies for Prevention and Recovery (Panel)
DevSecOps
2024
Feb
SAST - Static Analysis integration lab
DevSecOps
Scaling Incident Response using Jira, Jupyter and GSuite
DevSecOps
2021
Jan
Scaling Kubernetes - One Pod per file
DevSecOps
2021
Jun
Scaling Threat Models visualisations using PlantUML and VisJS
DevSecOps
2020
Dec
Scaling Your Security Program with Semgrep
DevSecOps
2021
Jun
SDA SE Cluster Scanner is going Open Source
DevSecOps
2021
Mar
Secrets and credentials scanning lab
DevSecOps
Secured Digital Workspace
DevSecOps
2022
May
Securing CI/CD runners through eBPF agent
DevSecOps
2024
Jan
Security as Code: A DevSecOps Approach
DevSecOps
2022
Mar
Security-Scan your production images
DevSecOps
2021
Sep
Shift Smart - risk based approach on appsec
DevSecOps
2023
Jun
Shift-Right Security: Emphasizing Post-Deployment Monitoring and Response (Panel)
DevSecOps
2023
Oct
Shodan OSINT Automation to Mass Exploitation of Vulnerabilities
DevSecOps
2022
Jan
SOAR - Security Orchestration, Automation, and Response (Panel)
DevSecOps
2023
Feb
Sonar Cube Integrations with GitHub
DevSecOps
2020
Dec
Spreading security across the SDLC (with semgrep and other tools)
DevSecOps
2021
Mar
Starbase - Graph-based security analysis for everyone
DevSecOps
2022
Mar
Stop Committing Your Secrets - Git Hooks To The Rescue
DevSecOps
2024
Jan
Taking Your DevOps Tooling To The Dark Side
DevSecOps
2023
Jun
Testing Ephemeral Kubernetes Applications
DevSecOps
2021
Jun
The Rise of AI Security Engineers
DevSecOps
2024
Jun
Threat Modeling Kata VI
DevSecOps
2024
Dec
Threat Modeling V
DevSecOps
2024
Jun
To DevSecOps or not to DevSecOps: is that a question?
DevSecOps
Tune your Toolbox for Velocity and Value (SCA)
DevSecOps
2022
Mar
Using AppMap runtime code visualizations to scout for security flaws
DevSecOps
2022
Mar
Using Domain Specific Languages (DSL) for testing
DevSecOps
2021
Jan
Using Elastic and Kibana for Scale and Security Visualisation
DevSecOps
2021
Nov
Using Kubernetes to create a scalable Security Proxy solution
DevSecOps
2020
Oct
Using Open Source AppMap for Runtime Security Analysis
DevSecOps
2022
Dec
Using OWASP Nettacker for Recon and Vulnerability Scanning
DevSecOps
2022
Jul
Using Splunk for Incident Response (Panel)
DevSecOps
2023
Dec
Using Teleport to Secure SSH and Kubernetes Access
DevSecOps
2021
Nov
Using VPC Flows to monitor EC2 Traffic
DevSecOps
2021
Apr
WordPress: Hacking and Securing
DevSecOps
2022
Dec
Yor:Automated IaC tag and trace
DevSecOps
2021
Jun
Zero Trust Database Access Using OpenZiti and JDBC
DevSecOps
2023
Apr
Zero Trust Network Access Framework
DevSecOps
2022
Jul