| GS AppSec Daily Scrum (Mon) Table 1 |
| GS AppSec Daily Scrum (Tue) Table 1 |
| GS AppSec Daily Scrum (Wed) Table 1 |
| GS AppSec Daily Scrum (Thu) Table 1 |
| GS AppSec Daily Scrum (Fri) Table 1 |
|
| | Time slot over-subscribed | Using maps to define how to capture, detect and prevent 6 real-world security incidents Larch room | Threat model cheat sheets Kings room |
| Time slot over-subscribed | Using JIRA-NeoVis to graph Threat Models | Application Security Verification Standard 314 - Owasp Projects villa |
| Time slot over-subscribed | Azure Security Features, Just a Few Pedley room | Wardley Mapping – a practical session on how to use value chain mapping Larch room | Integrating Security Tools in the SDL Maulden room |
| Time slot over-subscribed | Using Jira to handle Incident Response - simulations | Using JIRA-NeoVis to create graphical representations of JIRA data Larch room |
|
| | Creating ELK Dashboards Table 1 |
| Implementing the OWASP responsible disclosure Maturity Model Table 3 |
| | |
| Time slot over-subscribed | Hands-on JIRA Schema refactoring Larch room | Creating a Steady-State Hypothesis Pedley room | Integrating Security Tools in the SDL using OWASP DevSecOps Studio Maulden room |
| Time slot over-subscribed | Agile Practices for Security Teams Larch room | DevSecOps Maturity Model (DSOMM) Maulden room |
| Time slot over-subscribed | Using User Story Mapping for effective communication Larch room | Creating Appsec metrics and visualisation Maulden room |
| Time slot over-subscribed | Writing security tests to confirm vulnerabilities and fixes Pedley room | Using the OWASP Maturity Model tool |
| Using AI and ML for incident response Larch room |
|
| Time slot over-subscribed | Create Wardley Maps for multiple security scenarios Larch room | Hands on Chaos Experiments Pedley room | Owasp Cloud Security Workshop (BETA) Maulden room |
| Time slot over-subscribed | Using JIRA-NeoVis to graph GDPR Data Journeys Larch room | Attack chains as TM technique Kings room |
| | Time slot over-subscribed | Creating an open 3rd Party Supplier Questionnaire and maturity model 311 - OWASP SAMM villa | JIRA Risk Workflow Portland room | Squad Modelling and Cross Functional Teams Pedley room | Securing the CI Pipeline Maulden room |
| PBX-GS Offsite session 5 317 - Photobox villa |
|
| Time slot over-subscribed | PBX-GS Offsite session 1 314 - Owasp Projects villa |
| Time slot over-subscribed | PBX-GS Offsite session 2 317 - Photobox villa |
| Time slot over-subscribed | Integrating Security into an Spotify Model (and using Squads for Security teams) Maulden room | Federated Login with Social Platforms Threat Modeling Cheat Sheet Kings room |
| Time slot over-subscribed | PBX-GS Offsite session 4 317 - Photobox villa | Using graphs for GDPR mappings and visualisations |
| |
| Time slot over-subscribed | Hands-on JIRA Schema refactoring (DS) main-stage |
| | | | |
| Time slot over-subscribed | Create a Slack bot in Python 313 - DevSecCon villa | SAMM DevSecOps Version 311 - OWASP SAMM villa |
| | | | |
| | Time slot over-subscribed | Using Threat Models for GDPR 317 - Photobox villa |
| Time slot over-subscribed | Using Neo4J Enterprise | Writing Checkmarx SAST rules 313 - DevSecCon villa |
| Using Veracode SAST Engine |
| |