Participant's team(s):
Peter Turczak Daily Schedule
Monday | Tuesday | Wednesday | Thursday | Friday | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
| ||||||||||||||||
|
|
|
| ||||||||||||||
|
| ||||||||||||||||
|
|
|
| ||||||||||||||
|
|
|
| ||||||||||||||
|
|
| |||||||||||||||
|
|
Participating sessions details
Title | Description | type | When | Time | Acting as |
---|---|---|---|---|---|
A seat at the table | Keynote by Adam | user-session | Mon | DS-2 | participant |
JIRA - how to use it | How to use Jira for risk management, incident response and managing a team | user-session | participant | ||
Creating ELK Dashboard | |||||
Thinking in Graphs | Keynote by Dinis Cruz | user-session | Wed | KN-2 | participant |
Creating Appsec metrics and visualisation | AppSec Metrics and Visualisation | user-session | Wed | PM-1 | participant |
Writing security tests to confirm vulnerabilities and fixes | Hands on session writing security tests | user-session | Thu | PM-1 | participant |
secureCodeBox - How to improve your CI/CD pipeline with automated security tests | Hands on session to introduce the new project secureCodeBox.io and how you could use it to improve your CI/CD pipeline with automated security tests easily. | user-session | Wed | PM-2 | participant |
Security Ethics Checklist | working-session | Tue | AM-1 | participant | |
Securing the CI Pipeline | Secure the CI/CD pipeline | working-session | Thu | PM-2,PM-3 | participant |
IoT Threat Modeling Cheat Sheet | IoT Threat Modeling Cheat Sheet | working-session | Thu | AM-1 | participant |
Owasp Top 5 Machine Learning risks | working-session | Fri | AM-1 | participant | |
Zap - How to use it | User session to help ZAP users | user-session | Tue | Eve-1 | participant |
Juice Shop Coding Day | Hands-on coding session series to implement new challenges and other features in OWASP Juice Shop and its CTF-extension project. | working-session | Thu | AM-1,PM-1,PM-2,PM-3 | participant |
Cyber Risk Modeling | Session on Risk Modeling | working-session | Tue | PM-3 | participant |
OWASP Defect Dojo | Working Sessions for Owasp Defect Dojo | working-session | Tue | AM-1 | participant |
Using maps to define how to capture, detect and prevent 6 real-world security incidents | Hands on session on how to use Wardley maps | working-session | Tue | AM-1 | participant |
Threat model cheat sheets | Threat Modeling Working Session | working-session | Tue | AM-1 | participant |
Agile Practices for Security Teams | Agile Practices for Security Teams | working-session | Tue | PM-1 | participant |
Cyber Insurance | Session on Cyber Insurance | working-session | Tue | PM-2 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizers
metadata field (in this casePeter Turczak
)
Back to list of all Participants