Sotiraki Sima

Application Security, OneFirewall Alliance

Participant's team(s):

Sotiraki Sima Daily Schedule

MondayTuesdayWednesdayThursdayFriday
DS-1
10:00 - 10:30
GS AppSec Daily Scrum (Mon)
    Table 1
    GS AppSec Daily Scrum (Tue)
      Table 1
      GS AppSec Daily Scrum (Wed)
        Table 1
        GS AppSec Daily Scrum (Thu)
          Table 1
          GS AppSec Daily Scrum (Fri)
            Table 1
            AM-1
            10:30 - 12:30
            Time slot over-subscribed
            Using maps to define how to capture, detect and prevent 6 real-world security incidents
            Larch room
            Threat model cheat sheets
            Kings room
            Time slot over-subscribed
            Using JIRA-NeoVis to graph Threat Models
            Application Security Verification Standard
            314 - Owasp Projects villa
            Time slot over-subscribed
            Azure Security Features, Just a Few
            Pedley room
            Wardley Mapping – a practical session on how to use value chain mapping
            Larch room
            Integrating Security Tools in the SDL
            Maulden room
            Time slot over-subscribed
            Using Jira to handle Incident Response - simulations
            Using JIRA-NeoVis to create graphical representations of JIRA data
            Larch room
            DS-2
            12:30 - 13:30
            Creating ELK Dashboards
            Table 1
            Implementing the OWASP responsible disclosure Maturity Model
            Table 3
            PM-1
            13:30 - 15:00
            Time slot over-subscribed
            Hands-on JIRA Schema refactoring
            Larch room
            Creating a Steady-State Hypothesis
            Pedley room
            Integrating Security Tools in the SDL using OWASP DevSecOps Studio
            Maulden room
            Time slot over-subscribed
            Agile Practices for Security Teams
            Larch room
            DevSecOps Maturity Model (DSOMM)
            Maulden room
            Time slot over-subscribed
            Using User Story Mapping for effective communication
            Larch room
            Creating Appsec metrics and visualisation
            Maulden room
            Time slot over-subscribed
            Writing security tests to confirm vulnerabilities and fixes
            Pedley room
            Using the OWASP Maturity Model tool
            Using AI and ML for incident response
            Larch room
            PM-2
            15:30 - 16:30
            Time slot over-subscribed
            Create Wardley Maps for multiple security scenarios
            Larch room
            Hands on Chaos Experiments
            Pedley room
            Owasp Cloud Security Workshop (BETA)
            Maulden room
            Time slot over-subscribed
            Using JIRA-NeoVis to graph GDPR Data Journeys
            Larch room
            Attack chains as TM technique
            Kings room
            Time slot over-subscribed
            Creating an open 3rd Party Supplier Questionnaire and maturity model
            311 - OWASP SAMM villa
            JIRA Risk Workflow
            Portland room
            Squad Modelling and Cross Functional Teams
            Pedley room
            Securing the CI Pipeline
            Maulden room
            PBX-GS Offsite session 5
            317 - Photobox villa
            PM-3
            16:30 - 17:30
            Time slot over-subscribed
            PBX-GS Offsite session 1
            314 - Owasp Projects villa
            Time slot over-subscribed
            PBX-GS Offsite session 2
            317 - Photobox villa
            Time slot over-subscribed
            Integrating Security into an Spotify Model (and using Squads for Security teams)
            Maulden room
            Federated Login with Social Platforms Threat Modeling Cheat Sheet
            Kings room
            Time slot over-subscribed
            PBX-GS Offsite session 4
            317 - Photobox villa
            Using graphs for GDPR mappings and visualisations
            Summit Wrap Up
              main-hall
              DS-3
              18:00 - 19:00
              Time slot over-subscribed
              Hands-on JIRA Schema refactoring (DS)
              main-stage
              Eve-1
              19:30 - 21:00
              Time slot over-subscribed
              Create a Slack bot in Python
              313 - DevSecCon villa
              SAMM DevSecOps Version
              311 - OWASP SAMM villa
              Eve-2
              21:00 - 23:00
              Time slot over-subscribed
              Using Threat Models for GDPR
              317 - Photobox villa
              Time slot over-subscribed
              Using Neo4J Enterprise
              Writing Checkmarx SAST rules
              313 - DevSecCon villa
              Using Veracode SAST Engine

              Participating sessions details

              TitleDescriptiontypeWhenTimeActing as
              Agile Practices for Security TeamsAgile Practices for Security Teamsworking-sessionTuePM-1participant
              Application Security Verification StandardSession on ASVSworking-sessionWedAM-1participant
              Attack chains as TM techniqueThreat Modeling Working Sessionworking-sessionTuePM-2participant
              DevSecOpsparticipant
              DevSecOps Maturity Model (DSOMM)DevSecOps Maturity Model (DSOMM)working-sessionTuePM-1,PM-2,PM-3participant
              Integrating Security Tools in the SDLIntegrate security tools as part of CI/CD pipeline to find/fix issues early in SDLworking-sessionThuAM-1, PM-1participant
              Integrating Security into an Spotify Model
              JIRA Risk WorkflowThis Working Session should result in an improved JIRA Risk Workflowworking-sessionThuPM-2participant
              Hands on Chaos Experimentsuser-sessionMonPM-2participant
              PBX-GS Offsite session 1private-sessionMonPM-3participant
              PBX-GS Offsite session 2private-sessionTuePM-3participant
              Federated Login with Social Platforms Threat Modeling Cheat SheetFederated Login with Social Platforms Threat Modeling Cheat Sheetworking-sessionWedPM-3participant
              Securing the CI PipelineSecure the CI/CD pipelineworking-sessionThuPM-2,PM-3participant
              Using graphs for GDPR mappings and visualisationsHands on sessions of mapping GDPR data to graphsuser-sessionThuPM-3participant
              Using Threat Models for GDPRHands on user session on how to use Threat Models in GDPR mappingsuser-sessionTueEve-2participant
              Threat model cheat sheetsThreat Modeling Working Sessionworking-sessionTueAM-1participant
              SAMM DevSecOps VersionCreate a totally new SAMM DevSecOps versionworking-sessionMonEve-1participant
              Creating Appsec metrics and visualisationAppSec Metrics and Visualisationuser-sessionWedPM-1participant
              Integrating Security Tools in the SDL using OWASP DevSecOps StudioUsing DevSecOps studio to learn and teach Integrating security tools in the SDLuser-sessionMonPM-1participant
              Owasp Cloud Security Workshop (BETA)A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday)working-sessionMonPM-2,PM-3participant

              Register as organizer

              To register as an organizer of an session or track:

              • add your name to the organizers metadata field (in this case Sotiraki Sima)


              Back to list of all Participants