Here is the current (under construction) summit Schedule. The summit will run June 4-8, 2018.
Note that we are still mapping a number of sessions and tracks, so if you need a particular session to occur on a particular day, now is the time to make sure it is on the right place.
By Tracks
| Monday | Tuesday | Wednesday | Thursday | Friday | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
  | 
  | 
  | 
  | 
  | 
By Sessions
Chaos Engineering
| when day | Mon | 
|---|---|
| description | Sessions focusing on Chaos Engineering | 
| organizers | Russ Miles Russ Miles | 
Total sessions for this track: 8
| Monday | Tuesday | Wednesday | Thursday | Friday | |||
|---|---|---|---|---|---|---|---|
  | |||||||
  | |||||||
  | |||||||
  | 
Sessions not mapped to an day and time
- Creating a Steady-State Hypothesis
 - Customising the Chaos Toolkit
 - Hands on Chaos Experiments
 - Real world Chaos Engineering
 
(back to all track's schedule)
CISO
| when day | Tue,Thu | 
|---|---|
| description | Working Sessions on topics related for CISOs and C-Level execs. | 
| organizers | Tony Richards Tony Richards | 
Total sessions for this track: 16
| Monday | Tuesday | Wednesday | Thursday | Friday | |||
|---|---|---|---|---|---|---|---|
  | |||||||
  | |||||||
  | |||||||
  | 
Sessions not mapped to an day and time
- CISO Ask Me Anything (AMA)
 - Cyber Insurance
 - Cyber Risk Modeling
 - GDPR Ask Me Anything GDPR
 - Integrating Security into an Spotify Model
 - OWASP Collective Defence Cluster (CDC)
 - Recruiting AppSec Talent
 - Vulnerability Intelligence Working Group
 - Want to become a CISO?
 - Want to become a CISO?
 
(back to all track's schedule)
DevSecOps
| when day | Tue Wed Thu | 
|---|---|
| description | Sessions focusing on the DevSecOps tools and techniques to embed security as part of CI/CD pipelines | 
| organizers | Imran Mohammed A Imran Mohammed A , Francois Raynaud Francois Raynaud | 
Total sessions for this track: 57
| Monday | Tuesday | Wednesday | Thursday | Friday | |||||
|---|---|---|---|---|---|---|---|---|---|
  | |||||||||
  | |||||||||
  | 
  | 
  | |||||||
  | 
  | 
  | |||||||
  | 
  | 
  | |||||||
  | |||||||||
  | 
  | ||||||||
  | 
  | 
Sessions not mapped to an day and time
- Adding security to VSTS pipeline
 - Agile Practices for Security Teams
 - AppSec SOC Monitoring Visualisation
 - Cloud brokerage - authentication and authorisation
 - Create a Slack bot in Python
 - Creating Appsec metrics and visualisation
 - Defining a Security Champion
 - Defining a Security Champion
 - Dependency management using Snyk
 - DevSecOps Maturity Model (DSOMM)
 - From Threat Modeling to DevSecOps metrics
 - Integrating Security into an Spotify Model (and using Squads for Security teams)
 - Integrating Security Tools in the SDL using OWASP DevSecOps Studio
 - Owasp Cloud Security Workshop (BETA)
 - OWASP Defect Dojo
 - OWASP DevSecOps Studio
 - Publishing apps in a VSTS security pipeline
 - Securing GitHub Integrations
 - Securing GitHub Integrations
 - Securing the CI Pipeline
 - Security Crowdsourcing
 - Using activity-oriented metrics for Security
 - Using The Hive for Incident Response
 - Web Application Honeypot
 - WebAuthn - Getting started workshop
 - Writing security tests to confirm vulnerabilities and fixes
 
(back to all track's schedule)
GDPR
| when day | Mon,Tue,Wed,Thu | 
|---|---|
| description | From GDPR Appropriate Security Controls to Real world GDPR practices, this is where the real GDPR security experts will be | 
| organizers | Tony Richards Tony Richards , Dinis Cruz Dinis Cruz | 
Total sessions for this track: 26
| Monday | Tuesday | Wednesday | Thursday | Friday | |||||
|---|---|---|---|---|---|---|---|---|---|
  | |||||||||
  | |||||||||
  | |||||||||
  | 
  | 
  | |||||||
  | 
Sessions not mapped to an day and time
- Creating a standard for GDPR patterns
 - DPO how to become one
 - DPO what to expect
 - European GDPR variations
 - Gamification of GDPR compliance
 - GDPR Appropriate Security Controls
 - GDPR Compliance what does it mean?
 - Hands-on GDPR Patterns
 - Meet the ICO
 - Policies for the security industry
 - Policies for the security industry
 - Using graphs for GDPR mappings and visualisations
 - Using Threat Models for GDPR
 
(back to all track's schedule)
Keynotes
| when day | Mon,Thu | 
|---|---|
| description | Keynote track featuring talks by security experts | 
| organizers | 
Total sessions for this track: 15
| Monday | Tuesday | Wednesday | Thursday | Friday | |||
|---|---|---|---|---|---|---|---|
  | |||||||
  | 
Sessions not mapped to an day and time
- A seat at the table
 - Adding Privacy by Design in Secure Application Development
 - Crossing the river by feeling the stones
 - Gamifying Security Dashboards
 - Summit Wrap Up
 - Thinking in Graphs
 
(back to all track's schedule)
Maps and Graphs
| when day | Thu | 
|---|---|
| description | Working Sessions for CISOs | 
| organizers | Dinis Cruz Dinis Cruz | 
Total sessions for this track: 21
| Monday | Tuesday | Wednesday | Thursday | Friday | |||
|---|---|---|---|---|---|---|---|
  | |||||||
  | |||||||
  | |||||||
  | 
Sessions not mapped to an day and time
- Cell based Structures for Security
 - Create Wardley Maps for Multiple Security Scenarios
 - Creating ELK Dashboards
 - SOC Value Chain using Wardley maps
 - Using JIRA-NeoVis to create graphical representations of JIRA data
 - Using maps to define how to capture, detect and prevent 6 real-world security incidents
 - Using Neo4J to filter and review SAST findings
 - Using Neo4J to filter and review SAST findings
 - Using User Story Mapping for effective communication
 - Wardley Mapping – a practical session on how to use value chain mapping
 
(back to all track's schedule)
Misc
| when day | |
|---|---|
| description | Misc Sessions on multiple topics | 
| organizers | 
Total sessions for this track: 48
| Monday | Tuesday | Wednesday | Thursday | Friday | |||||
|---|---|---|---|---|---|---|---|---|---|
  | 
  | ||||||||
  | 
  | 
  | |||||||
  | 
  | ||||||||
  | |||||||||
  | 
  | ||||||||
  | 
Sessions not mapped to an day and time
- Ask me anything (AMA) - Meet the Experts
 - Automation of MASVS with BDD
 - Cloud brokerage - authentication and authorisation
 - Creating Open Source Avatao exercises
 - Getting more women in Cyber-security
 - Group Discussion on Learning from Digital Incidents
 - Hands-on JIRA Schema refactoring
 - Hands-on JIRA Schema refactoring (DS)
 - Jira (how to use it)
 - JIRA - how to use it
 - JIRA Risk Workflow
 - Juice Shop Brainstorming
 - Juice Shop Coding Day
 - Lessons learned from public bug bounties programmes
 - MSc Application Security
 - Project Management
 - Running CTF Games with OWASP Juice Shop
 - Security Ethics Checklist
 - Security Playbooks
 - Squad Modelling and Cross Functional Teams
 - Update MSTG with changes in Android 8 (Oreo)
 - Update MSTG with changes in iOS 11
 - Using AI and ML for incident response
 - Using Jira to handle Incident Response - simulations
 - Using Neo4J to filter and review SAST findings
 - Women in Cyber-security: improving the gender balance
 - Writing a Security Budget
 
(back to all track's schedule)
Owasp Projects
| when day | Tue Wed Thu | 
|---|---|
| description | Sessions based around multiple Owasp Projects | 
| organizers | 
Total sessions for this track: 13
| Monday | Tuesday | Wednesday | Thursday | Friday | ||||
|---|---|---|---|---|---|---|---|---|
  | ||||||||
  | 
  | |||||||
  | 
  | |||||||
  | 
  | |||||||
  | 
OWASP SAMM
| when day | Mon,Tue,Wed,Thu | 
|---|---|
| description | SAMM team working together in a 5-day sprint on SAMMv2 | 
| organizers | Sebastien Deleersnyder Sebastien Deleersnyder , Bart De Win Bart De Win | 
Total sessions for this track: 34
| Monday | Tuesday | Wednesday | Thursday | Friday | |||
|---|---|---|---|---|---|---|---|
  | |||||||
  | |||||||
  | |||||||
  | |||||||
  | 
Sessions not mapped to an day and time
- Creating an open 3rd Party Supplier Questionnaire and maturity model
 - DevSecOps Maturity Model (DSOMM)
 - Implementing the OWASP responsible disclosure Maturity Model
 - SAMM - Best Practices
 - SAMM benchmarking
 - SAMM DevSecOps Version
 - SAMM Introduction
 - SAMM Roundtable
 - SAMM Summit Outcomes
 - SAMM2 Kickoff
 - SAMM2 Kickoff
 - SAMMv2 Establish the Document Model
 - SAMMv2 Measurement Model
 - SAMMv2 working session - Design
 - SAMMv2 working session - Governance
 - SAMMv2 working session - Implementation
 - SAMMv2 working session - Operations
 - SAMMv2 working session - Verification
 - Using the OWASP Maturity Model tool
 
(back to all track's schedule)
Security Questions
| when day | Mon,Tue,Wed,Thu,Fri | 
|---|---|
| description | Track focused on creating Security Questions and Answers (with daily quizzes planned for the evening sessions) | 
| organizers | John Fitzgerald John Fitzgerald , Rachel Power Rachel Power | 
Total sessions for this track: 50
| Monday | Tuesday | Wednesday | Thursday | Friday | |||
|---|---|---|---|---|---|---|---|
  | |||||||
  | |||||||
  | |||||||
  | |||||||
  | |||||||
  | |||||||
  | 
Sessions not mapped to an day and time
- Consolidate and process all Security Quiz data
 - Create .Net Security Questions
 - Create AWS Security Questions
 - Create Docker Security Questions
 - Create Java Security Questions
 - Create NodeJS Security Questions
 - Create Owasp AWS Security Questions
 - Create Owasp Top 10 Security Questions
 - Create Perl Security Questions
 - Create PHP Security Questions
 - Create Security Economics Quiz
 - Create Security Ethics Checklist Questions
 - Creating Security Questions
 - Prepare friday Quiz session
 - Present Security Quiz Data
 - Review quiz answers from Mon
 - Review quiz answers from Thu
 - Review quiz answers from Tue
 - Review quiz answers from Wed
 - Security Questions team briefing
 - Security Questions workshop
 - Security Quiz Night (Mon)
 - Security Quiz Night (Thu)
 - Security Quiz Night (Tue)
 - Security Quiz Night (Wed)
 - Transform OWASP Exam into Security Questions
 - Transform OWASP Exam into Security Questions
 
(back to all track's schedule)
Threat Model
| when day | Mon,Tue,Wed,Thu,Fri | 
|---|---|
| description | With Working Sessions such as Attack chains as TM technique and Threat Model cheat sheets | 
| organizers | Steven Wierckx Steven Wierckx | 
Total sessions for this track: 53
| Monday | Tuesday | Wednesday | Thursday | Friday | |||
|---|---|---|---|---|---|---|---|
  | |||||||
  | |||||||
  | |||||||
  | |||||||
  | |||||||
  | 
Sessions not mapped to an day and time
- API Threat Modeling Cheat Sheet
 - Attack chains as TM technique
 - Back to the future with Threat Modeling
 - Convert the templates from GE-Health to risk patterns
 - Create generic TM for CMS
 - Creating diagrams with DOT language
 - Define an Open Risk Pattern format
 - Describe different ways of implementing TM in agile organisations
 - Docker and Kubernetes Threat Modeling Cheat Sheet
 - Federated Login with Social Platforms Threat Modeling Cheat Sheet
 - How do you define and measure the value of Threat Modeling?
 - How do you define and measure the value of Threat Modeling?
 - How to Scale Threat Modeling.
 - How to Threat Model Features with Questionnaires
 - IoT Threat Modeling Cheat Sheet
 - Methodology / technique showcase
 - Methodology / technique showcase
 - SABSA and threat modeling
 - SABSA and threat modeling
 - Share your Threat Models diagrams and create a Book
 - Threat model cheat sheets
 - Threat model closing session
 - Threat model guide
 - Threat model track opening session
 - Threat Model training through Gamification
 - Threat Modeling Website Structure
 - Update Threat Modeling pages on owasp web site
 - Update Threat Modeling website 1
 
(back to all track's schedule)