File tree
683 files changed
+892
-864
lines changed- admin
- config
- sessions-mappings
- sessions-social-media
- black-lives-matter
- calendar
- faq
- onsite-summit
- accommodation
- arriving
- attendee-information
- catering
- content-support
- i-need-help
- id-like-to-join-the-summit
- im-a-remote-participant-faq
- im-an-on-site-participant
- im-an-organiser
- infrastructure-needs
- organisers-duties
- oss-structure
- reach-us-in-slack
- registration-info
- remote-participants
- schedule
- session-types
- speakers
- sponsored_tickets
- tickets
- transport-and-directions
- working-session-checklist
- website/session-not-found
- how_to_create_a_sessio_and_a_participant_page
- how_to_update_a_session_or_a_participant_page
- jobs
- participant
- _template
- glasswall
- abbas-haidar
- chris-holman
- dharam-patel
- dinis-cruz
- elvin-white
- georgina-gonzalez
- hanuma
- harry-georgiou
- luke-robbertse
- lwasampijja-baker
- matthew-pigram
- michael-hidalgo
- mudit-gupta
- paul-burke
- paul-farrington
- images
- organizers
- aaron-rinehart
- adam-leon-smith
- adam-pierson
- adam-shostack
- ahmed-mohamed
- akira-brand
- alan-jenkins
- aleksandar-simovic
- alexander_knorr
- alona-reyes
- alvaro-munoz
- andrew-van-der-stock
- anish-mohammd
- anna-lezhikova
- ante-gulam
- aryan.prasad
- ashley-burke
- austin-kelleher
- avi-d
- ayse-vlok
- barak-schoster-goihman
- ben-schofield
- ben_dehaan
- bernard-quarshie
- brandon-green
- brian-hinojosa
- brook-schoenfield
- carey-lening
- celine-pypaert
- cenk-kalpakoglu
- charles-marrow
- chase-fopiano
- chen-gour-arie
- chenxi-wang
- chris-diao
- chris-madden
- chris-mcdermott
- chris-reddington
- chris-romeo
- christian-schneider
- christiandehoyos
- claire-allen-addy
- clint-dovholuk
- clint-gibler
- cristian-klein
- daniel-shore
- danusia-rolewicz
- dave-van-stein
- dave-voutila
- david-clarke
- david-fauth
- deepak-prabhakara
- dheeraj_madhukar
- don-murdoch
- dwayne-mcdaniel
- eliza-may-austin
- elizabeth-lawler
- emil-wareus
- federico-marengo
- filip-grebowski
- francesco-cipollon
- fraser-scott
- gabriel-l-manor
- gary-mcgraw
- glenn-wilson
- grant-ongers
- guy-marong
- harryg
- irene_michlin
- isabel-barbera
- izar-tarandach
- jakub-kaluzny
- jakub-krzywda
- jameel-nabbo
- james-bore
- james-dell
- james-rabe
- jan-thielscher
- jana-caniglia
- jane-frankland
- janet-bonar-law
- jasmine-henry
- jay-jacobs
- jeff-jockish
- jeremiah-grossman
- jeremy-treadwell
- jeroen_willemsen
- jim-manico
- john-kinsella
- john-marshall
- john-melton
- jonathan-marcil
- joseharoperalta
- joseph_katsioloudes
- josh-grossman
- juan-spinel
- jude-pereira
- karla-reffold
- kashyap-thimmaraju
- katie-charlton
- kevin-gilpin
- kim-carter
- kim-wuyts
- kimberley-graham
- kiran-gandhi
- kriti-mohun
- krzysztof-daniel
- larkins-carvalho
- lars-hermerschmidt
- laura-de-vesine
- lee-newcombe
- lianne-potter
- lior-zatlavi
- luis-servin
- luis_saiz
- maciej-owsiany
- magno_logan
- manos-skalidis
- marcin-kozlowski
- marcos-schejtman
- mario-platt
- marios_clark
- marius-poskus
- mark-curphey
- mark-potkewitz
- martin_obiols
- matt-johnson
- matthew-adams
- matthew-coles
- matthew-thompson
- maya-boeckh
- melissa-ryan
- mert-coskuner
- michael-meaney
- miguel-llamazares
- mitch-cohen
- naresh-chouhan
- nathan-case
- nick-drage
- nick-gibson
- nick-harris
- nielet-dmello
- oded-ben-david
- ogechukwu-okonor
- omer-yaron
- or-weis
- osman-karan
- pandy-knight
- paul-howard
- paul-simms
- pedro_henrique_carvalho_dantas
- pete-cheslock
- peter-olivier
- petra-vukmirovic
- prakarsh-gupta
- puneet-ahuja
- rakesh_elamaran
- raz-cohen
- rebecca-mckeown
- richea-perry
- rui-shantilal
- saber-ferjani
- sakshyam_shah
- sam-stepanyan
- samuel-ubido
- sanna-nissinen
- sarah-clarke
- sarb-sembhi
- sashank-dara
- sebastien-deleersnyde
- shahzaib-ali-khan
- sheetal-joseph
- simon-wardley
- stacey-ebbs
- staceywallis
- stefan-streichsbier
- stephen-giguere
- steve-purkis
- surbhi-gupta
- tanya_janca
- tariq-rashid
- thomas-owen
- thomas_la_piana
- tiago-mendo
- tim-ward
- timo-pagel
- tudor-girba
- uday.thubati
- vandana-verma
- venkat-ramshet
- zachary-broomfield
- zenobia-godschalk
- oss
- didar-gelici
- felipe-zipitria
- jemma-davis
- oss
- photo-gallery
- schedule
- search
- sessions
- 2020
- mini-summits
- dec
- cdr/cdr-engine-standard
- devsecops
- creating-secure-builds-of-containers
- scaling-threat-models-visualisations-using-plantuml-and-visjs
- sonar-cube-integrations-with-github
- what-is-semgrep-and-how-to-use-it
- governance
- encrypted-calendars-the-need-and-consequences
- soc2-certification-for-saas-companies
- owasp
- how-owasp-can-help-devsecops
- how-owasp-can-help-guides-and-testing
- schrems-ii/schrems-ii-finding-workable-solutions
- secure-by-scenario/secure-by-scenario-data-breach-at-the-north-pole
- threat-modeling
- threat-modeling-glasswall-desktop
- threat-modeling-manifesto
- wardley-maps
- ama-with-simon-wardley
- wardley-maps-and-services-model-at-glasswall
- nov
- secure-by-scenario/how-to-build-your-own-scenario-and-run-it
- security-labels
- refresher-on-security-labels
- security-labels-and-schrems-ii
- threat-modeling/threat-modeling-for-schrems-ii
- oct
- post-summit-secure-by-scenario
- post-summit-using-kubernetes-proxy-solution
- post-summit-virtual-pub
- threat-modeling-playbook-post-summit
- summits
- jun
- cdr/bakeoff-anti-virus-vs-cdr-vs-sandboxing
- keynotes/keynote-open-security-summit-2020
- may/training
- _training_template
- week-1
- ciso-and-risk-management/trusted-partner-network-demo
- cloud-security
- aws-security
- cloud-security-101
- containers
- gcp-security
- identity-management-and-secret-stores
- covid
- covid-apps-analysis
- covid-safe-paths-threat-modeling-part-1
- covid-safe-paths-threat-modeling-part-2
- vulnerabilities-review-of-covid-apps
- devsecops
- chef-inspec-compliance-as-code
- jira-jupyter-integration-introduction
- hacking-and-defending
- hacking-glasswall-sdk-and-cloud-friday
- hacking-glasswall-sdk-and-cloud-thursday
- owasp-projects
- multijuicer-introduction
- owasp-juiceshop-introduction
- social/drinks-and-persona-building-creating-adversary-trading
- threat-modeling
- threat-modeling-introduction-mon
- threat-modeling-introduction-thu
- threat-modeling-introduction-wed
- wardley-maps
- wardley-maps-introduction2
- wardley-maps-introduction3
- wardley-maps-introduction4
- wardley-maps-introduction5
- week-2
- ciso-and-risk-management
- cyber-and-privacy-risk-management-101
- incident-scenario-exercise
- supply-chain-attacks-the-rise-of-the-third-party-poopers
- devsecops
- dast-dynamic-analysis-integration-lab
- dependency-scanning-lab
- dso-git
- dso-iast--rasp
- github-action--codeql-security
- infrastructure-scan--encryption
- lgtm-in-action
- owning-app-sec-automation-with-python
- sast-static-analysis-integration-lab
- secrets-and-creds-scanning-lab
- to-devsecops-or-not-to-devsecops-is-that-a-question
- hacking-and-defending
- applying-owasp-web-security-testing--guide
- introduction-to-o365-security
- o365-security---anti-phishing-best-practises-and-demo
- oh-dear-my-laptop-is-hacked
- osint-ctf
- social-engineering
- owasp-juice-shop/owasp-juiceshop-introduction
- security-standards
- isg-converting-to-checklist
- isg-measure-visualise-standards
- isg-office-docs
- isg-pdf
- isg-security-expoit-protection
- ncsc-safe-file-import
- social
- improv-comedy-as-a-social-engineering-tool
- social-cards-against-humanity-game
- threat-modeling
- introduction-to-threat-modeling-by-avi-douglen
- threat-modeling-icap
- threat-modeling-introduction
- wardley-maps
- introduction-to-wardley-mapping
- using-wardley-mapping-for-security-strategy-and-architecture-development
- wardley-maps-friday
- wardley-maps-introduction-mon
- wardley-maps-thursday
- 2021/mini-summits
- apr
- devsecops
- compliant-kubernetes-case-study
- inspection-of-dsomm-dimension-consolidation
- lessons-learned-with-creating-1-million-kubernetes-pods
- mitigating-risks-through-open-source-bitcoin-tracing
- using-vpc-flows-to-monitor-ec2-traffic
- governance
- a-perspective-on-automating-3rd-party-risk-assessment
- graph-based-vulnerability-management
- modern-office-spaces
- the-modern-data-broker-landscape
- the-rats-and-cats-of-risks-graph-based-risk-framework
- owasp
- asvs-user-stories-creation-part-1
- asvs-user-stories-creation-part-2
- introduction-into-owasp-dsomm
- o2-platform-tools-you-can-use-today
- secure-by-scenario/secure-by-scenario
- jan
- cdr/cdr-engine-standard
- devsecops
- ama-with-jeremiah-grossman
- ama-with-jim-manico
- scaling-incident-response-using-jira-jupyter-gsuite
- using-dsls-for-testing
- write-codeql-queries
- governance/automating-soc2-using-jira
- owasp
- ama-owasp-board
- how-owasp-can-help-devsecops
- how-owasp-can-help-guides-and-testing
- schrems-ii/schrems-ii-finding-workable-solutions
- secure-by-scenario/secure-by-scenario
- threat-modeling
- remote-threat-modeling
- threats-categorization-pitfalls
- wardley-maps/maturity-mapping-contextualise
- jun
- devsecops
- automated-iac-tag-and-trace
- scaling-kubernetes---one-pod-per-file
- scaling-security-program-with-semgrep
- testing-ephemeral-kubernetes-applications
- governance
- challenges-in-iot-security
- reciprocity-why-the-cybersecurity-industry-needs-more-anthropologists
- rules--recommendations
- vendor-security-management-using-jira
- owasp
- asvs-user-stories-creation---part-5
- asvs-user-stories-creation---part-6
- secure-by-scenario/secure-by-scenario
- threat-modeling
- agile-threat-modeling-with-open-source-tools
- beginners-threat-modeling
- mar
- devsecops
- da-se-cluster-scanner-is-going-open-source
- spreading-security-across-the-sdlc
- misc
- moldable-development-with-glamorous-toolkit-part-1
- moldable-development-with-glamorous-toolkit-part-2
- moldable-development-with-glamorous-toolkit-part-3
- pyroscope-internals-and-using-pyroscope-for-real-time-view-of-cloud
- schrems-ii/schrems-ii---transfer-risk-triage-and-other-adventures-in-scoping
- secure-by-scenario/secure-by-scenario
- may
- cdr
- cdr-api-standard
- exploring-known-good-use-cases
- devsecops
- distroless-containers
- for-bugs-start-with-a-passing-test
- managing-projects-using-github-issues-and-zenhub
- governance/what-to-do-in-preparation-for-a-threat-model
- misc/ai-ml-european-regulation
- owasp
- asvs-user-stories-creation-p2
- asvs-user-stories-creation
- static-analysis-with-o2-platform
- secure-by-scenario/secure-by-scenario
- threat-modeling
- threat-modeling-glasswall-cloud-sdk
- threat-modeling-glasswall-f2f-plugin
- threat-modeling-using-glamorous-toolkit
- nov
- cloud-security/going-multicloud---securing-human-and-service-identities-in-aws-vs-azure
- devsecops
- check_out_their_lateral_moves_the_importance_of_blast_radius_in_devsecops
- creating-a-scalable-api-test-framework-in-aws
- using-elastic-and-kibana-for-scale-and-security-visualisation
- using-teleport-to-secure-ssh-and-kubernetes-access
- kubernetes
- cooking-the-perfect-docker-container-for-a-react-app
- developing-secure-multi-cloud-applications
- oss/oss---celebrating-the-community-and-plans-for-2022
- owasp
- asvs-user-stories-creation
- owasp-top-10-2021
- risk-and-governace
- cve-cwe-cvss-cwss-where-do-i-look-first
- panel---prioritizing-risks-and-vulnerabilities-based-on-context
- using-jira-to-map-and-visualise-risks
- threat-modeling
- agile_threat_modeling_with_open_source_tools
- learn-threat-modeling-using-the-amazing-oss-resources
- threat-mapping---a-workshop-discussion
- sep
- devsecops
- clusterscanner-demonstration.md
- dsomm
- governance/cdsa
- oss
- devsecops-project
- new-oss-projects
- owasp-project
- semgrep-project
- threat-modeling-project
- owasp/asvs-user-stories-creation
- threat-modeling/hacking-threat-modeling
- 2022/mini-summits
- dec
- devsecops
- automation-and-scale-with-owasp-zap
- context-is-king-prioritization-is-queen-and-cvss-is-dead
- lowcode-access-control-making-the-complex-world-of-permissions-approachable-to-everyone
- open-policy-agent
- privacy-the-challenges-in-post-tornado-cash-world
- using-open-source-appmap-for-runtime-security-analysi
- wordpress-hacking-and-securing
- education/ama-with-alyssa-miller
- governance
- crowdsourcing-security-talent
- cyber-insurance-a-deeper-approach
- data-integrity-and-information-integrity
- demystifying-risk-and-the-future-of-vulnerability-management
- practical-approachconsiderations-to-developing-a-cybersecurity-program
- quantifying-usability-in-security-designs-and-risk-assessments
- security-business-enabler-how-to-align-your-security-program-to-business-goals
- the-challenges-with-dns-security
- we-need-secondorder-thinking-in-security
- women-in-cyber-security-personal-experiences-and-how-to-be-an-ally
- threat-modeling
- the-survival-guide-to-implementing-threat-modeling
- threat-modelling-as-code-v
- jan
- devsecops
- abusetests-for-developers
- fundamentals_of_cloud_security_threat_identification_aws_services
- privacy_as_a_code_open_source_developer_tools_for_data_privacy
- shodan_osint_automation_to_mass_exploitation_of_vulnerabilities
- governance
- jira-schemas-and-workflows-for-appsec-and-risk-management
- predicting-the-rise-and-fall-of-an-open-source-project
- technical-leadership-and-influence
- kubernetes
- cooking_the_perfect_docker_container_for_a_react_app_part2
- from_kubernetes_to_a_portable_secure_and_compliant_platform_databases_message_queues_and_caches
- misc/membership-awards
- owasp
- asvs-user-stories
- making_asvs_truly_yours
- owasp-security-bot---hypercharge-your-cloud-automation
- owasp_wrong_secrets_project_goals_under_the_hood_and_where_do_we_go_from_here
- threat-modeling
- iot_pervasive_vulnerability_threat_landscape_and_endusers
- software-security-and-threat-modeling
- threat-modelling-lambdas-and-threat-modelling-as-code
- jul
- devsecops
- applying-zero-trust-principles-to-industrial-iot-and-otics
- using-owasp-nettacker-for-recon-and-vulnerability-scanning
- zero-trust-network-access-framework
- governance
- bridging-the-skill-gap-and-hiring-challenges-in-cyber
- how-do-male-and-female-voices-project-authority-in-cyber
- mentoring-and-its-challenges-in-cyber-security
- product-permissions-common-pitfalls-and-how-not-to-fall-for-them
- protecting-critical-data-through-the-implementation-of-information-security-management-system-to-meet-compliance
- resilience-engineering-safety-science-and-systems-thinking-new-tools-for-the-complex-world
- the-challenge-of-auditing-smart-contract-audit-especially-ones-with-more-advanced-cryptographic-primitives-such-as-zkp-or-mpc
- the-value-of-cto-cisos-and-how-to-make-it-work
- social/wards-and-networking-drinks-time
- threat-modeling/ama-with-adam-shostack
- wardley-maps/why-wardley-maps-changed-how-i-think
- mar
- cloud-security
- cloud-pentesting-concepts-cloudgoat-walkthrough-securing-cloud-endpoints
- the-cloud-security-architects-aka-the-knights-of-the-cloud-kingdom-paneldiscussion
- devsecops
- doing-compliance-differently-policies-as-code-evidence-based-compliance-through-automation
- lessons_learned_from_trying_to_creat_architecture_diagrams_as_code
- open-security-control-testing-at-scale
- owasp_top_10_partii
- parsec_hardware_security_at_your_fingertips
- security_as_code_a_devsecops_approach
- starbase-graph-based-security-analysis-for-everyone
- tune-up-your-toolbox-for-better-appsec-value-sca-edition
- using-appmap-runtime-code-visualizations-to-scout-for-security-flaws
- governance
- ama_with_brook_schoenfield
- build-state-of-the-art-soc-with-mitre-attack
- building-security-champions
- ciso-roundtable-mar-2022
- creating-virtual-diverse-security-teams
- ideas-for-graph-dbs-like-neo4j
- the-business-case-for-security-champions
- owasp/purple_teaming_with_owasp_purpleteam
- threat-modeling
- automating-architectural-risk-analysis-with-the-open-threat-model-format
- security-on-autonomous-systems-a-long-way-to-go
- threat-models-and-wardley-maps
- when-c4s-meet-threat-models
- may
- devsecops
- a-workshop-on-dast-and-how-to-put-it-into-your-pipeline
- appsec-trending-recommendations-fixing-security-in-cloud-appsec
- beat-alert-fatigue-with-cyber-asset-relationship-graphs
- docker-for-security-professionals
- hack-your-own-app
- how-can-we-make-grafana-a-great-open-source-security-tool.devsecops
- jim-and-dinis-talk-appsec
- kubernetes-security
- open-source-modern-access-control
- secured-digital-workspace
- governance
- a-cyber-security-roadmap-how-to
- adversary-simulation-close-the-gaps-in-your-security-posture
- cdc-collective-defence-clusters
- dependency-management-and-supply-chain-security
- how-to-overcome-dns-security-threat
- security-champions-sharing-experience
- the-human-firewall
- the-next-insider-threat-isnt-your-staff
- threat-modeling/threat-model-for-an-autonomous-system
- nov/devsecops/fileless-attacks-and-living-off-the-land-binaries
- sep
- devsecops
- cvss-cve-vulnerabilities-and-the-land-of-broken-dreams
- devsecops-beyond-cicd-pipelines
- devsecops-for-modern-identity-and-access-management
- overviewofthenewdsommapp
- permission-models-as-code-securing-the-entire-stack
- education-and-training/how-to-become-a-cyber-security-professional
- governance
- ama-with-dinis-and-mark-curphey
- ama-with-mcgraw
- cyber-insurance
- hiring-manager-insights-to-secure-your-next-security-roleteam-member
- successes-and-failures-at-security-training
- misc
- blockchain-and-its-security-1
- why-you-dont-need-to-be-technical-to-get-into-security
- threat-modeling
- threat-modeling-failure-modes
- threat-modelling-adoption-in-disciplines-other-than-development
- wardley-maps/data-culture
- 2023/mini-summits
- apr
- chatgpt
- chatgpt-cyber-risks--how-to-harden-against-them
- chatgpt_impact_on_cyber_security
- devsecops
- application-security-vulnerabilities-measurements-maturity-magic-vulnerability-framework-project
- zero-trust-database-access-using-openziti-and-jdbc
- governance
- behaviour-change-and-awareness
- conducting-effective-table-top-exercises-for-cyber-incident-response-practise
- cybersecurity-assessments-finding-the-way-forward
- risk-treatment-planning-in-modern-tech-space
- security-vendors-operating-model
- the-truth-about-suffering-a-cyber-attack
- women-kick-off-in-cybersecurity
- threat-modeling/threat-modeling-kata
- dec
- devsecops
- panel-gitlab-security-tools
- panel-using-splunk-for-incident-response
- risk-acceptance-and-oisru
- ml-ai
- emerging-roles-in-cybersecurity-adapting-recruitment-strategies
- machine-learning-in-semgrep-leveraging-ai-for-enhanced-static-analysis
- oss/open-security-summit-awards-and-2023-plans
- secure-by-scenario/social-engineering-attacks-strengthening-human-firewall
- semgrep/semgrep-in-the-ci-cd-pipeline-automating-code-quality-and-security-checks
- feb
- devsecops
- an-appsec-guide-to-practical-cryptography
- how-to-operate-a-secure-kubernetes-platform
- how-we-built-a-security-automation-software-utilizing-open-source-components
- linux-kernel-containerization-without-dockerruncoci
- panel-aws-security-hub
- panel-github-security-tools
- panel-incident-reponse-playbooks
- panel-soar-security-orchestration-automation-and-response
- panel-using-datadog-for-incident-response
- panel-using-elastic-for-incident-response
- panel-using-jira-to-manage-risks
- governance
- developer-driven-security-in-high-growth-environments
- panel-ciso-role-in-2023
- panel-finding-and-hiring-security-talent
- panel-oisru
- security-design--guidance-at-scale
- teamwork-and-collaboration-tool
- threat-modeling/live-threat-modeling-of-a-drone-online-food-delivery-system
- wardleymaps/panel-wardley-maps-in-cyber-security
- jun
- chatgpt/chatgpt_how_to_use_it
- devsecops
- continuous-access-control-with-opal-cedar
- shift-smart-risk-based-approach-on-appsec
- taking-your-devops-tooling-to-the-dark-side
- threat-modeling-kata2
- governance
- are-our-users-always-smarter-than-ai
- language-content-negotiation-where-its-where-its-going
- rise-of-automotive-attacks
- oct
- devsecops
- anticipating-the-future-strengthening-app-security-through-developer-centric-foresight
- appsec-threats-deserve-their-own-incident-response-plan
- attackgen-harnessing-language-models-for-cybersecurity-simulations
- chatgp-and-genai-privacy-massive-uncertainty-and-massive-opportunity
- cloud-native-security-tools-enhancing-cloud-protection-capabilities
- creating-the-genai-athena-bot-from-the-cyber-boardroom
- devsecops-maturity-model-updates
- how-genai-agents-will-dramatically-change-our-industry
- network-security
- protect-your-application-not-just-the-network-add-zero-trust-superpowers-to-your-critical-applications-and-systems
- shift-right-security-emphasizing-post-deployment-monitoring-and-response
- zero-trust-architecture-strengthening-cloud-security-posture
- governance
- data-driven-approach-on-vulnerabilities-appsec-vs-infra
- lets-go-on-a-data-with-vulnerabilities
- risk-communication-bridgin-the-gap-between-risk-professionals-and-executives
- the-cybersecurity-talent-gap-addressing-the-growing-skills-shortage
- threat-modeling
- threat-modeling-for-serverless--architectures-identifying-risks-in-a-serverless-world
- threat-modeling-kata3
- wardley-maps/mapping-threat-intelligence-enhancing-situational-awareness
- 2024/mini-summits
- dec
- devsecops
- ai-and-appsec-are-we-finally-on-the-verge-of-the-big-breakthrough
- hacking-oauth-an-attackers-view-of-your-oauth-flows
- improving-devops-using-genai
- governance
- can-we-trust-ai-with-our-cyber-defences
- combatting-adversarial-ai-the-role-of-cisos-ctos-and-the-top-management-in-defending-against-ai-powered-cyberattacks
- regulatory-developments-in-cybersecurity
- taking-responsibility-for-your-software-how-to-simply-monitor-your-solutions-for-known-vulnerabiities-and-keep-your-customers-informed
- using-genai-to-create-personalised-cybersecurity-news-feeds
- threat-modeling/threat-modeling-kata-vi
- feb
- devsecops
- iot-and-cyber-threat-intelligence-staying-ahead-of-the-curve
- ransomware-resilience-strategies-for-prevention-and-recovery
- jan
- banners
- devsecops
- api-security-by-design
- call-for-metrics
- securing-cicd-runners-through-ebpf-agent
- stop-committing-your-secrets-git-hooks-to-the-rescue
- governance
- alert-readiness-framework
- battling-the-coming-wave-understanding-cybersecurity-in-2024
- championing-security-scaling-security-at-every-level
- ethical-hacking-challenge.mds-evaluating-practical-skills-in-selection-processes
- leveraging-artificial-intelligence-and-machine-learning-in-recruitment
- owasp-wrongsecrets-a-journey-into-secret-management-failures
- owasp-wrongsecrets-define-the-future-challenges-together
- technics-to-limit-hallucinations-when-using-a-llm-solution-like-chatgpt
- turning-the-tide-how-to-convince-senior-management-and-ownership-to-invest-in-cybersecurity
- utilising-security-champions-product-teams
- who-goes-there-actively-detecting-intruders-with-cyber-deception-tools
- threat-modeling
- ai-driven-threat-modelling-with-stride-gpt
- how-to-perform-threat-assessments-the-right-way
- threat-modeling-kata-iv
- jun
- devsecops
- the-rise-of-ai-security-engineers
- threat-modeling-kata-v
- governance
- addressing-the-cyber-unemployment-crisis-a-positive-outlook
- attack-surface-mapping
- mental-health-in-cyber-security
- micro-mid-range-macro-how-gen-ai-risk-breaks-us
- scaling-cybersecurity-teams-using-genais-and-fms
- supply-chain-security-strengthening-resilience-against-third-party-risk
- zero-trust-in-distributed-media-workflows-for-hollywood
- threat-modeling
- ai-agents-for-cyber-threat-intelligence
- threat-hunting-and-detection-strategies-proactive-defense-in-action
- sep
- devsecops/hands-on-workshop-utilize-owasp-dsomm-app-to-define-and-deliver-your-own-program
- genai
- deterministic-genai-outputs-with-provenance
- use-genai-to-understand-and-transform-content-not-to-create-it
- using-genai-to-scale-cisos-reporting-workflows
- governance
- defense-in-depth-layers-practical-security-for-llms-on-google-cloud
- improving-mental-health--security-outcomes-through-flow-states
- stories-of-female-empowerment-in-cyber-security
- threat-modeling/threat-modeling-the-llm-pipeline
- wardley-maps/advanced-persistent-threat-apt-mapping-and-mitigation
- _template
- json
- sponsors
- tickets
- venue
Some content is hidden
Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.
683 files changed
+892
-864
lines changed| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
39 | 39 | | |
40 | 40 | | |
41 | 41 | | |
42 | | - | |
| 42 | + | |
43 | 43 | | |
44 | 44 | | |
45 | 45 | | |
46 | 46 | | |
47 | 47 | | |
48 | 48 | | |
49 | 49 | | |
50 | | - | |
| 50 | + | |
51 | 51 | | |
52 | | - | |
| 52 | + | |
53 | 53 | | |
54 | 54 | | |
55 | 55 | | |
| |||
Large diffs are not rendered by default.
Large diffs are not rendered by default.
Large diffs are not rendered by default.
| Original file line number | Diff line number | Diff line change | |
|---|---|---|---|
| |||
17 | 17 | | |
18 | 18 | | |
19 | 19 | | |
20 | | - | |
| 20 | + | |
21 | 21 | | |
22 | 22 | | |
23 | 23 | | |
| |||
0 commit comments