Participant's team(s):
Peter Turczak Daily Schedule
| Monday | Tuesday | Wednesday | Thursday | Friday | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
| ||||||||||||||||
|
|
|
| ||||||||||||||
|
| ||||||||||||||||
|
|
|
| ||||||||||||||
|
|
|
| ||||||||||||||
|
|
| |||||||||||||||
|
|
Participating sessions details
| Title | Description | type | When | Time | Acting as |
|---|---|---|---|---|---|
| A seat at the table | Keynote by Adam | user-session | Mon | DS-2 | participant |
| JIRA - how to use it | How to use Jira for risk management, incident response and managing a team | user-session | participant | ||
| Creating ELK Dashboard | |||||
| Thinking in Graphs | Keynote by Dinis Cruz | user-session | Wed | KN-2 | participant |
| Creating Appsec metrics and visualisation | AppSec Metrics and Visualisation | user-session | Wed | PM-1 | participant |
| Writing security tests to confirm vulnerabilities and fixes | Hands on session writing security tests | user-session | Thu | PM-1 | participant |
| secureCodeBox - How to improve your CI/CD pipeline with automated security tests | Hands on session to introduce the new project secureCodeBox.io and how you could use it to improve your CI/CD pipeline with automated security tests easily. | user-session | Wed | PM-2 | participant |
| Security Ethics Checklist | working-session | Tue | AM-1 | participant | |
| Securing the CI Pipeline | Secure the CI/CD pipeline | working-session | Thu | PM-2,PM-3 | participant |
| IoT Threat Modeling Cheat Sheet | IoT Threat Modeling Cheat Sheet | working-session | Thu | AM-1 | participant |
| Owasp Top 5 Machine Learning risks | working-session | Fri | AM-1 | participant | |
| Zap - How to use it | User session to help ZAP users | user-session | Tue | Eve-1 | participant |
| Juice Shop Coding Day | Hands-on coding session series to implement new challenges and other features in OWASP Juice Shop and its CTF-extension project. | working-session | Thu | AM-1,PM-1,PM-2,PM-3 | participant |
| Cyber Risk Modeling | Session on Risk Modeling | working-session | Tue | PM-3 | participant |
| OWASP Defect Dojo | Working Sessions for Owasp Defect Dojo | working-session | Tue | AM-1 | participant |
| Using maps to define how to capture, detect and prevent 6 real-world security incidents | Hands on session on how to use Wardley maps | working-session | Tue | AM-1 | participant |
| Threat model cheat sheets | Threat Modeling Working Session | working-session | Tue | AM-1 | participant |
| Agile Practices for Security Teams | Agile Practices for Security Teams | working-session | Tue | PM-1 | participant |
| Cyber Insurance | Session on Cyber Insurance | working-session | Tue | PM-2 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizersmetadata field (in this casePeter Turczak)
Back to list of all Participants