Conference Rooms
Kings Threat Model | Portland Misc | Larch Maps and Graphs | Montague Security Questions | Maulden DevSecOps | Pedley Misc | |
---|---|---|---|---|---|---|
AM-1 10:30 - 12:30 | Track Introductions | Security Questions workshop Security Questions Security Questions workshop | Summit Onboarding | OS Summit Website - how to use it | ||
PM-1 13:30 - 15:00 | Threat model track opening session Threat Model Threat model track opening session | SAMM Introduction OWASP SAMM SAMM Introduction | Hands-on JIRA Schema refactoring | Security Questions workshop Security Questions Security Questions workshop | Integrating Security Tools in the SDL using OWASP DevSecOps Studio | Creating a Steady-State Hypothesis Chaos Engineering Creating a Steady-State Hypothesis |
PM-2 15:30 - 16:30 | Threat Modeling Website Structure Threat Model Threat Modeling Website Structure | SAMM - Best Practices OWASP SAMM SAMM - Best Practices | Create Wardley Maps for multiple security scenarios Maps and Graphs Create Wardley Maps for multiple security scenarios | Create Owasp Top 10 Security Questions Security Questions Create Owasp Top 10 Security Questions | Owasp Cloud Security Workshop (BETA) DevSecOps Owasp Cloud Security Workshop (BETA) | Hands on Chaos Experiments Chaos Engineering Hands on Chaos Experiments |
PM-3 16:30 - 17:30 | Update Treat Modeling website 1 Threat Model Update Treat Modeling website 1 | SAMM Round Table OWASP SAMM SAMM Round Table | Create .Net Security Questions Security Questions Create .Net Security Questions | Owasp Cloud Security Workshop (BETA) DevSecOps Owasp Cloud Security Workshop (BETA) | Real world Chaos Engineering Chaos Engineering Real world Chaos Engineering |
Main conference Hall
Main Stage | Table 1 | Table 2 | Table 3 | Table 4 | Table 5 | Table 6 | |
---|---|---|---|---|---|---|---|
KN-1 9:20 - 9:35 | |||||||
KN-2 9:40 - 9:55 | |||||||
DS-1 10:00 - 10:30 | GS AppSec Daily Scrum (Mon) | GS Detect Daily Scrum (Mon) | GS Risk Daily Scrum (Mon) | GS Summit Daily Scrum (Mon) | SAMM Core Daily Scrum (Mon) | ||
DS-2 12:30 - 13:30 | A seat at the table Keynotes A seat at the table | ||||||
DS-3 18:00 - 19:00 | Hands-on JIRA Schema refactoring (DS) | GDPR Compliance what does it mean? |
Villas
OWASP SAMM | DevSecCon | Owasp Projects | CertDev | Photobox | Threat Modeling | Women in Tech | |
---|---|---|---|---|---|---|---|
AM-1 10:30 - 12:30 | |||||||
PM-1 13:30 - 15:00 | |||||||
PM-2 15:30 - 16:30 | Lessons learned from public bug bounties programmes | ||||||
PM-3 16:30 - 17:30 | PBX-GS Offsite session 1 | ||||||
Eve-1 19:30 - 21:00 | SAMM DevSecOps Version OWASP SAMM SAMM DevSecOps Version | Create a Slack bot in Python DevSecOps Create a Slack bot in Python | Security Quiz Night (Mon) Security Questions Security Quiz Night (Mon) | Using a Rules Engine and Risk Patterns with IriusRisk | |||
Eve-2 21:00 - 23:00 | Create a Slack bot in Python DevSecOps Create a Slack bot in Python | Hands on Avatao path on Owasp Top 10 | Update Treat Modeling website 2 Threat Model Update Treat Modeling website 2 |