Adding security to VSTS pipeline |
Agile Practices for Security Teams |
API Threat Modeling Cheat Sheet |
Attack chains as TM technique |
Automation of MASVS with BDD |
Back to the future with Threat Modeling |
Create AWS Security Questions |
Create Java Security Questions |
Creating a standard for GDPR patterns |
Creation of Security Buttons |
Cyber Insurance |
Cyber Risk Modeling |
Define an Open Risk Pattern format |
DevSecOps Maturity Model (DSOMM) |
European GDPR variations |
MSc Appication Security |
OWASP Collective Defence Cluster (CDC) - One year on |
OWASP Defect Dojo |
Review quiz answers from Mon |
SAMMv2 working session - Design |
SAMMv2 working session - Governance |
SAMMv2 working session - Implementation |
Security Buttons Extended |
Security Crowdsourcing |
Security Ethics Checklist |
Share your playbooks and release them under Creative Commons |
Share your security polices and release them under Creative Commons |
Threat model cheat sheets |
Update MSTG with changes in Android 8 (Oreo) |
Using JIRA-NeoVis to graph GDPR Data Journeys |
Using maps to define how to capture, detect and prevent 6 real-world security incidents |