Manager, Security Transformations, Lakhshya CyberSecurity Labs

Participating sessions details
| Title | Description | type | When | Time | Acting as |
|---|---|---|---|---|---|
| Owasp Testing Guide v5 | Working Sessions for Owasp Testing Guide v5 | working-session | Thu | PM-2,PM-3 | participant |
| Application Security Verification Standard | Session on ASVS | working-session | Wed | AM-1 | participant |
| Integrating Security Tools in the SDL using OWASP DevSecOps Studio | Using DevSecOps studio to learn and teach Integrating security tools in the SDL | user-session | Mon | PM-1 | participant |
| Owasp Cloud Security Workshop (BETA) | A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday) | working-session | Mon | PM-2,PM-3 | participant |
| Agile Practices for Security Teams | Agile Practices for Security Teams | working-session | Tue | PM-1 | participant |
| OWASP Defect Dojo | Working Sessions for Owasp Defect Dojo | working-session | Tue | AM-1 | participant |
| Defining a Security Champion | working-session | participant | |||
| Security Crowdsourcing | Working Sessions for Security Crowdsourcing | working-session | Tue | PM-3 | participant |
| Incident handling with DarkTrace | Share knowledge on incident handling with DarkTrace | product-session | Wed | Eve-2 | participant |
| Writing Akamai rules | Share knowledge on incident handling with Akamai | product-session | Tue | DS-2 | participant |
| Securing GitHub Integrations | How to secure Github Integrations | working-session | participant | ||
| Creating Appsec metrics and visualisation | AppSec Metrics and Visualisation | user-session | Wed | PM-1 | participant |
| Securing the CI Pipeline | Secure the CI/CD pipeline | working-session | Thu | PM-2,PM-3 | participant |
| AppSec SOC Monitoring Visualisation | |||||
| Dependency management using Snyk | Hands on session on how to best use Snyk for dependency management | product-session | participant | ||
| Writing Checkmarx SAST rules | Hands on session on how to write custom rules for the Checkmarx SAST engine | product-session | Wed | Eve-2 | participant |
| Integrating Security Tools in the SDL | Integrate security tools as part of CI/CD pipeline to find/fix issues early in SDL | working-session | Thu | AM-1, PM-1 | participant |
| DevSecOps Maturity Model (DSOMM) | DevSecOps Maturity Model (DSOMM) | working-session | Tue | PM-1,PM-2,PM-3 | participant |
| Integrating Security Tools in the SDL | Integrate security tools as part of CI/CD pipeline to find/fix issues early in SDL | working-session | Thu | AM-1, PM-1 | participant |
| Web Application Honeypot | working-session | Thu | PM-3 | participant | |
| Integrate securityheaders.com in CI pipeline | Hands on session on how to integrate securityheaders.com in CI pipeline | product-session | Thu | Eve-1 | participant |
| JIRA Risk Workflow | This Working Session should result in an improved JIRA Risk Workflow | working-session | Thu | PM-2 | participant |
| Using The Hive for Incident Response | Hands on session on using a customized version of the The Hive for Incident Response | product-session | participant | ||
| Using Veracode SAST Engine | Hands on session on how to use Veracode's SAST Engine | product-session | Thu | Eve-2 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizersmetadata field (in this caseSugumaran Uppili)
Back to list of all Participants