Peter Turczak

Participant's team(s):

    Peter Turczak Daily Schedule

    MondayTuesdayWednesdayThursdayFriday
    KN-2
    9:40 - 9:55
    Thinking in Graphs
    main-stage
    AM-1
    10:30 - 12:30
    Time slot over-subscribed
    Security Ethics Checklist
    Montague room
    OWASP Defect Dojo
    Maulden room
    Using maps to define how to capture, detect and prevent 6 real-world security incidents
    Larch room
    Threat model cheat sheets
    Kings room
    Time slot over-subscribed
    Azure Security Features, Just a Few
    Pedley room
    IoT Threat Modeling Cheat Sheet
    Kings room
    Juice Shop Coding Day
    314 - Owasp Projects villa
    Owasp Top 5 Machine Learning risks
    Portland room
    DS-2
    12:30 - 13:30
    A seat at the table
    main-stage
    PM-1
    13:30 - 15:00
    Agile Practices for Security Teams
    Larch room
    Creating Appsec metrics and visualisation
    Maulden room
    Time slot over-subscribed
    Writing security tests to confirm vulnerabilities and fixes
    Pedley room
    PM-2
    15:30 - 16:30
    Cyber Insurance
    Portland room
    secureCodeBox - How to improve your CI/CD pipeline with automated security tests
    Pedley room
    Time slot over-subscribed
    Securing the CI Pipeline
    Maulden room
    PM-3
    16:30 - 17:30
    Cyber Risk Modeling
    Portland room
    Time slot over-subscribed
    Eve-1
    19:30 - 21:00
    Zap - How to use it
    314 - Owasp Projects villa

    Participating sessions details

    TitleDescriptiontypeWhenTimeActing as
    A seat at the tableKeynote by Adamuser-sessionMonDS-2participant
    JIRA - how to use itHow to use Jira for risk management, incident response and managing a teamuser-sessionparticipant
    Creating ELK Dashboard
    Thinking in GraphsKeynote by Dinis Cruzuser-sessionWedKN-2participant
    Creating Appsec metrics and visualisationAppSec Metrics and Visualisationuser-sessionWedPM-1participant
    Writing security tests to confirm vulnerabilities and fixesHands on session writing security testsuser-sessionThuPM-1participant
    secureCodeBox - How to improve your CI/CD pipeline with automated security testsHands on session to introduce the new project secureCodeBox.io and how you could use it to improve your CI/CD pipeline with automated security tests easily.user-sessionWedPM-2participant
    Security Ethics Checklistworking-sessionTueAM-1participant
    Securing the CI PipelineSecure the CI/CD pipelineworking-sessionThuPM-2,PM-3participant
    IoT Threat Modeling Cheat SheetIoT Threat Modeling Cheat Sheetworking-sessionThuAM-1participant
    Owasp Top 5 Machine Learning risksworking-sessionFriAM-1participant
    Zap - How to use itUser session to help ZAP usersuser-sessionTueEve-1participant
    Juice Shop Coding DayHands-on coding session series to implement new challenges and other features in OWASP Juice Shop and its CTF-extension project.working-sessionThuAM-1,PM-1,PM-2,PM-3participant
    Cyber Risk ModelingSession on Risk Modelingworking-sessionTuePM-3participant
    OWASP Defect DojoWorking Sessions for Owasp Defect Dojoworking-sessionTueAM-1participant
    Using maps to define how to capture, detect and prevent 6 real-world security incidentsHands on session on how to use Wardley mapsworking-sessionTueAM-1participant
    Threat model cheat sheetsThreat Modeling Working Sessionworking-sessionTueAM-1participant
    Agile Practices for Security TeamsAgile Practices for Security Teamsworking-sessionTuePM-1participant
    Cyber InsuranceSession on Cyber Insuranceworking-sessionTuePM-2participant

    Register as organizer

    To register as an organizer of an session or track:

    • add your name to the organizers metadata field (in this case Peter Turczak)


    Back to list of all Participants