Peter Turczak

Participant's team(s):

Peter Turczak Daily Schedule

Monday Tuesday Wednesday Thursday Friday
KN-2
9:40 - 9:55
Thinking in Graphs
main-stage
AM-1
10:30 - 12:30
Time slot over-subscribed
Security Ethics Checklist
Montague room
OWASP Defect Dojo
Maulden room
Using maps to define how to capture, detect and prevent 6 real-world security incidents
Larch room
Threat model cheat sheets
Kings room
Time slot over-subscribed
Azure Security Features, Just a Few
Pedley room
IoT Threat Modeling Cheat Sheet
Kings room
Juice Shop Coding Day
314 - Owasp Projects villa
Owasp Top 5 Machine Learning risks
Portland room
DS-2
12:30 - 13:30
A seat at the table
main-stage
PM-1
13:30 - 15:00
Agile Practices for Security Teams
Larch room
Creating Appsec metrics and visualisation
Maulden room
Time slot over-subscribed
Writing security tests to confirm vulnerabilities and fixes
Pedley room
PM-2
15:30 - 16:30
Cyber Insurance
Portland room
secureCodeBox - How to improve your CI/CD pipeline with automated security tests
Pedley room
Time slot over-subscribed
Securing the CI Pipeline
Maulden room
PM-3
16:30 - 17:30
Cyber Risk Modeling
Portland room
Time slot over-subscribed
Eve-1
19:30 - 21:00
Zap - How to use it
314 - Owasp Projects villa

Participating sessions details

Title Description type When Time Acting as
A seat at the table Keynote by Adam user-session Mon DS-2 participant
JIRA - how to use it How to use Jira for risk management, incident response and managing a team user-session participant
Creating ELK Dashboard
Thinking in Graphs Keynote by Dinis Cruz user-session Wed KN-2 participant
Creating Appsec metrics and visualisation AppSec Metrics and Visualisation user-session Wed PM-1 participant
Writing security tests to confirm vulnerabilities and fixes Hands on session writing security tests user-session Thu PM-1 participant
secureCodeBox - How to improve your CI/CD pipeline with automated security tests Hands on session to introduce the new project secureCodeBox.io and how you could use it to improve your CI/CD pipeline with automated security tests easily. user-session Wed PM-2 participant
Security Ethics Checklist working-session Tue AM-1 participant
Securing the CI Pipeline Secure the CI/CD pipeline working-session Thu PM-2,PM-3 participant
IoT Threat Modeling Cheat Sheet IoT Threat Modeling Cheat Sheet working-session Thu AM-1 participant
Owasp Top 5 Machine Learning risks working-session Fri AM-1 participant
Zap - How to use it User session to help ZAP users user-session Tue Eve-1 participant
Juice Shop Coding Day Hands-on coding session series to implement new challenges and other features in OWASP Juice Shop and its CTF-extension project. working-session Thu AM-1,PM-1,PM-2,PM-3 participant
Cyber Risk Modeling Session on Risk Modeling working-session Tue PM-3 participant
OWASP Defect Dojo Working Sessions for Owasp Defect Dojo working-session Tue AM-1 participant
Using maps to define how to capture, detect and prevent 6 real-world security incidents Hands on session on how to use Wardley maps working-session Tue AM-1 participant
Threat model cheat sheets Threat Modeling Working Session working-session Tue AM-1 participant
Agile Practices for Security Teams Agile Practices for Security Teams working-session Tue PM-1 participant
Cyber Insurance Session on Cyber Insurance working-session Tue PM-2 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Peter Turczak)


Back to list of all Participants