Sotiraki Sima

Application Security, OneFirewall Alliance

Participant's team(s):

Sotiraki Sima Daily Schedule

Monday Tuesday Wednesday Thursday Friday
DS-1
10:00 - 10:30
GS AppSec Daily Scrum (Mon)
Table 1
GS AppSec Daily Scrum (Tue)
Table 1
GS AppSec Daily Scrum (Wed)
Table 1
GS AppSec Daily Scrum (Thu)
Table 1
GS AppSec Daily Scrum (Fri)
Table 1
AM-1
10:30 - 12:30
Time slot over-subscribed
Using maps to define how to capture, detect and prevent 6 real-world security incidents
Larch room
Threat model cheat sheets
Kings room
Time slot over-subscribed
Using JIRA-NeoVis to graph Threat Models
Application Security Verification Standard
314 - Owasp Projects villa
Time slot over-subscribed
Azure Security Features, Just a Few
Pedley room
Wardley Mapping – a practical session on how to use value chain mapping
Larch room
Integrating Security Tools in the SDL
Maulden room
Time slot over-subscribed
Using Jira to handle Incident Response - simulations
Using JIRA-NeoVis to create graphical representations of JIRA data
Larch room
DS-2
12:30 - 13:30
Creating ELK Dashboards
Table 1
Implementing the OWASP responsible disclosure Maturity Model
Table 3
PM-1
13:30 - 15:00
Time slot over-subscribed
Hands-on JIRA Schema refactoring
Larch room
Creating a Steady-State Hypothesis
Pedley room
Integrating Security Tools in the SDL using OWASP DevSecOps Studio
Maulden room
Time slot over-subscribed
Agile Practices for Security Teams
Larch room
DevSecOps Maturity Model (DSOMM)
Maulden room
Time slot over-subscribed
Using User Story Mapping for effective communication
Larch room
Creating Appsec metrics and visualisation
Maulden room
Time slot over-subscribed
Writing security tests to confirm vulnerabilities and fixes
Pedley room
Using the OWASP Maturity Model tool
Using AI and ML for incident response
Larch room
PM-2
15:30 - 16:30
Time slot over-subscribed
Create Wardley Maps for multiple security scenarios
Larch room
Hands on Chaos Experiments
Pedley room
Owasp Cloud Security Workshop (BETA)
Maulden room
Time slot over-subscribed
Using JIRA-NeoVis to graph GDPR Data Journeys
Larch room
Attack chains as TM technique
Kings room
Time slot over-subscribed
Creating an open 3rd Party Supplier Questionnaire and maturity model
311 - OWASP SAMM villa
JIRA Risk Workflow
Portland room
Squad Modelling and Cross Functional Teams
Pedley room
Securing the CI Pipeline
Maulden room
PBX-GS Offsite session 5
317 - Photobox villa
PM-3
16:30 - 17:30
Time slot over-subscribed
PBX-GS Offsite session 1
314 - Owasp Projects villa
Time slot over-subscribed
PBX-GS Offsite session 2
317 - Photobox villa
Time slot over-subscribed
Integrating Security into an Spotify Model (and using Squads for Security teams)
Maulden room
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Time slot over-subscribed
PBX-GS Offsite session 4
317 - Photobox villa
Using graphs for GDPR mappings and visualisations
Summit Wrap Up
main-hall
DS-3
18:00 - 19:00
Time slot over-subscribed
Hands-on JIRA Schema refactoring (DS)
main-stage
Eve-1
19:30 - 21:00
Time slot over-subscribed
Create a Slack bot in Python
313 - DevSecCon villa
SAMM DevSecOps Version
311 - OWASP SAMM villa
Eve-2
21:00 - 23:00
Time slot over-subscribed
Using Threat Models for GDPR
317 - Photobox villa
Time slot over-subscribed
Using Neo4J Enterprise
Writing Checkmarx SAST rules
313 - DevSecCon villa
Using Veracode SAST Engine

Participating sessions details

Title Description type When Time Acting as
Agile Practices for Security Teams Agile Practices for Security Teams working-session Tue PM-1 participant
Application Security Verification Standard Session on ASVS working-session Wed AM-1 participant
Attack chains as TM technique Threat Modeling Working Session working-session Tue PM-2 participant
DevSecOps Sessions focusing on the DevSecOps tools and techniques to embed security as part of CI/CD pipelines track participant
DevSecOps Maturity Model (DSOMM) DevSecOps Maturity Model (DSOMM) working-session Tue PM-1,PM-2,PM-3 participant
Integrating Security Tools in the SDL Integrate security tools as part of CI/CD pipeline to find/fix issues early in SDL working-session Thu AM-1, PM-1 participant
Integrating Security into an Spotify Model
JIRA Risk Workflow This Working Session should result in an improved JIRA Risk Workflow working-session Thu PM-2 participant
Hands on Chaos Experiments user-session Mon PM-2 participant
PBX-GS Offsite session 1 private-session Mon PM-3 participant
PBX-GS Offsite session 2 private-session Tue PM-3 participant
Federated Login with Social Platforms Threat Modeling Cheat Sheet Federated Login with Social Platforms Threat Modeling Cheat Sheet working-session Wed PM-3 participant
Securing the CI Pipeline Secure the CI/CD pipeline working-session Thu PM-2,PM-3 participant
Using graphs for GDPR mappings and visualisations Hands on sessions of mapping GDPR data to graphs user-session Thu PM-3 participant
Using Threat Models for GDPR Hands on user session on how to use Threat Models in GDPR mappings user-session Tue Eve-2 participant
Threat model cheat sheets Threat Modeling Working Session working-session Tue AM-1 participant
SAMM DevSecOps Version Create a totally new SAMM DevSecOps version working-session Mon Eve-1 participant
Creating Appsec metrics and visualisation AppSec Metrics and Visualisation user-session Wed PM-1 participant
Integrating Security Tools in the SDL using OWASP DevSecOps Studio Using DevSecOps studio to learn and teach Integrating security tools in the SDL user-session Mon PM-1 participant
Owasp Cloud Security Workshop (BETA) A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday) working-session Mon PM-2,PM-3 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Sotiraki Sima)


Back to list of all Participants