| | | Time slot over-subscribed | AWS WAF for DDoS Mitigation Portland room | Create Docker Security Questions |
| | |
| | | | | |
| Time slot over-subscribed | Hands-on JIRA Schema refactoring Larch room | Integrating Security Tools in the SDL using OWASP DevSecOps Studio Maulden room |
| Time slot over-subscribed | Akamai WAF & Ruleset Pedley room | DevSecOps Maturity Model (DSOMM) Maulden room |
| Time slot over-subscribed | Docker and Kubernetes Threat Modeling Cheat Sheet Kings room | Using User Story Mapping for effective communication Larch room |
| | |
| Threat Modeling Website Structure Kings room |
| Time slot over-subscribed | Create AWS Security Questions Montague room | Cyber Insurance Portland room |
| Time slot over-subscribed | Securing AWS S3 Buckets Portland room | SOC Monitoring Visualisation Maulden room |
| Time slot over-subscribed | How to scale Threat Modeling. Kings room | JIRA Risk Workflow Portland room |
| |
| Update Treat Modeling website 1 Kings room |
| Time slot over-subscribed | Back to the future with Threat Modeling Kings room | Cyber Risk Modeling Portland room |
| Federated Login with Social Platforms Threat Modeling Cheat Sheet Kings room |
| Time slot over-subscribed | Threat Model training through Gamification Kings room | Using graphs for GDPR mappings and visualisations | Web Application Honeypot Portland room | Dark and Deep Web Threat Intelligence Source Pedley room |
| |
| Time slot over-subscribed | Hands-on JIRA Schema refactoring (DS) main-stage |
| Replacing Akamai with AWS Shield Table 5 |
| Gamification of GDPR compliance Table 2 |
| Vulnerability Intelligence Working Group Table 3 |
| |
| | | Incident handling with DarkTrace 317 - Photobox villa |
| | |