Conference Rooms
Kings Threat Model | Portland Misc | Larch Maps and Graphs | Montague Security Questions | Maulden DevSecOps | Pedley Misc | |
---|---|---|---|---|---|---|
AM-1 10:30 - 12:30 | IoT Threat Modeling Cheat Sheet Threat Model IoT Threat Modeling Cheat Sheet | Wardley Mapping – a practical session on how to use value chain mapping | Integrating Security Tools in the SDL | Azure Security Features, Just a Few | ||
PM-1 13:30 - 15:00 | Threat model guide Threat Model Threat model guide | Hands-on GDPR Patterns | Cell based Structures for Security Maps and Graphs Cell based Structures for Security | Create Security Economics Quiz Security Questions Create Security Economics Quiz | From Threat Modeling to DevSecOps metrics | Writing security tests to confirm vulnerabilities and fixes |
PM-2 15:30 - 16:30 | How to scale Threat Modeling. Threat Model How to scale Threat Modeling. | JIRA Risk Workflow | SOC Value Chain using Wardley maps Maps and Graphs SOC Value Chain using Wardley maps | Women in Cyber-security: improving the gender balance | Securing the CI Pipeline DevSecOps Securing the CI Pipeline | Squad Modelling and Cross Functional Teams |
PM-3 16:30 - 17:30 | Threat Model training through Gamification Threat Model Threat Model training through Gamification | Web Application Honeypot DevSecOps Web Application Honeypot | Prepare Thursday Quiz session Security Questions Prepare Thursday Quiz session | Securing the CI Pipeline DevSecOps Securing the CI Pipeline | Dark and Deep Web Threat Intelligence Source |
Main conference Hall
Main Stage | Table 1 | Table 2 | Table 3 | Table 4 | Table 5 | Table 6 | |
---|---|---|---|---|---|---|---|
KN-1 9:20 - 9:35 | |||||||
KN-2 9:40 - 9:55 | Crossing the river by feeling the stones | ||||||
DS-1 10:00 - 10:30 | GS AppSec Daily Scrum (Thu) | GS Detect Daily Scrum (Thu) | GS Risk Daily Scrum (Thu) | GS Summit Daily Scrum (Thu) | SAMM Core Daily Scrum (Thu) | Review quiz answers from Wed Security Questions Review quiz answers from Wed | |
DS-2 12:30 - 13:30 | InSecurity Keynotes InSecurity | Recruiting AppSec Talent | Using Data Science for log analysis Maps and Graphs Using Data Science for log analysis | Creating Security exams (How to) Security Questions Creating Security exams (How to) | |||
DS-3 18:00 - 19:00 | Vulnerability Intelligence Working Group |
Villas
OWASP SAMM | DevSecCon | Owasp Projects | CertDev | Photobox | Threat Modeling | Women in Tech | |
---|---|---|---|---|---|---|---|
AM-1 10:30 - 12:30 | SAMM Project Meeting OWASP SAMM SAMM Project Meeting | Juice Shop Coding Day Owasp Projects Juice Shop Coding Day | |||||
PM-1 13:30 - 15:00 | Juice Shop Coding Day Owasp Projects Juice Shop Coding Day Running CTF Games with OWASP Juice Shop Owasp Projects Running CTF Games with OWASP Juice Shop | ||||||
PM-2 15:30 - 16:30 | Creating an open 3rd Party Supplier Questionnaire and maturity model | Juice Shop Coding Day Owasp Projects Juice Shop Coding Day Owasp Testing Guide v5 Owasp Projects Owasp Testing Guide v5 | |||||
PM-3 16:30 - 17:30 | SAMM benchmarking OWASP SAMM SAMM benchmarking | Juice Shop Coding Day Owasp Projects Juice Shop Coding Day Owasp Testing Guide v5 Owasp Projects Owasp Testing Guide v5 | PBX-GS Offsite session 4 | ||||
Eve-1 19:30 - 21:00 | Security Quiz Night (Thu) Security Questions Security Quiz Night (Thu) | Update Treat Modeling website 5 Threat Model Update Treat Modeling website 5 | |||||
Eve-2 21:00 - 23:00 |