Mario Platt

Sponsored By:

Participant's team(s):

Mario Platt Daily Schedule

Monday Tuesday Wednesday Thursday Friday
KN-2
9:40 - 9:55
Adding Privacy by Design in Secure Application Development
main-stage
AM-1
10:30 - 12:30
Time slot over-subscribed
Using maps to define how to capture, detect and prevent 6 real-world security incidents
Larch room
SAMMv2 working session - Governance
311 - OWASP SAMM villa
OWASP DevSecOps Studio
Maulden room
Time slot over-subscribed
Azure Security Features, Just a Few
Pedley room
Integrating Security Tools in the SDL
Maulden room
DS-2
12:30 - 13:30
Creating a standard for GDPR patterns
Table 2
Meet the ICO
PM-1
13:30 - 15:00
Creating a Steady-State Hypothesis
Pedley room
DevSecOps Maturity Model (DSOMM)
Maulden room
AWS Lambda Security
Portland room
Time slot over-subscribed
Hands-on GDPR Patterns
Portland room
Cell based Structures for Security
Larch room
PM-2
15:30 - 16:30
Securing AWS S3 Buckets
Portland room
Time slot over-subscribed
Securing the CI Pipeline
Maulden room
JIRA Risk Workflow
Portland room
PM-3
16:30 - 17:30
Real world Chaos Engineering
Pedley room
GDPR Appropriate Security Controls
Portland room
Time slot over-subscribed
Using graphs for GDPR mappings and visualisations
DS-3
18:00 - 19:00
GDPR Compliance what does it mean?
Table 1
European GDPR variations
Table 2
Eve-1
19:30 - 21:00
Security Quiz Night (Mon)
316 - CertDev villa
Eve-2
21:00 - 23:00
Hands on Avatao path on Owasp Top 10
314 - Owasp Projects villa

Participating sessions details

Title Description type When Time Acting as
Security Quiz Night (Mon) user-session Mon Eve-1 participant
Hands on Avatao path on Owasp Top 10 Try the Avatao learning platform product-session Mon Eve-2 participant
GDPR Compliance what does it mean? Now that GDPR is in force, what does GDPR Compliance mean and how to measure it working-session Mon DS-3 participant
European GDPR variations Mapping out the multiple differences across the EU working-session Tue DS-3 participant
Hands-on GDPR Patterns Using GDPR Patterns user-session Thu PM-1 participant
Using graphs for GDPR mappings and visualisations Hands on sessions of mapping GDPR data to graphs user-session Thu PM-3 participant
Creating a Steady-State Hypothesis Exploring the Chaos Toolkit's stead-state hypothesis and how one can be designed and constructed for DevSecOps concerns. working-session Mon PM-1 participant
Real world Chaos Engineering An exploration and working session to characterise, explore and implement real-world DevSecOps chaos experiments. working-session Mon PM-3 participant
Owasp Cloud Security Workshop (BETA
SAMMv2 working session - Governance multiple working sessions on the new SAMMv2 working-session Tue AM-1 participant
Securing the CI Pipeline Secure the CI/CD pipeline working-session Thu PM-2,PM-3 participant
Docker and Kubernetes Threat Modeling Cheat Shee
Cell based Structures for Security Spotify compliant organizational model in security domain working-session Thu PM-1 participant
Integrating Security Tools in the SDL Integrate security tools as part of CI/CD pipeline to find/fix issues early in SDL working-session Thu AM-1, PM-1 participant
JIRA Risk Workflow This Working Session should result in an improved JIRA Risk Workflow working-session Thu PM-2 participant
Meet the ICO If you could meet the ICO, what questions would you ask working-session Thu DS-2 participant
Security Playbooks
Adding Privacy by Design in Secure Application Development Keynote by Sebastien Deleersnyder user-session Fri KN-2 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Mario Platt)


Back to list of all Participants