Working Session's - With NO OrganizersBack to Editor's pages

These Working Sessions current have NO organizer and the content still needs some work. if you are interested in this topic, please sign-up as one of the organizers! This could be a great career opportunity to show your talent, skills and professionalism.

# name (title) track technologies participants # words status
1 AWS Lambda Security edit Tools Dinis Cruz 54
draft
2 AppSec Job Fair edit Security Crowdsourcing Ross Tanner,Francois Raynaud 129
review-content
3 AppSec Review and Pentest Playbook edit Security Playbooks Pentest 114
review-content
4 Applying Top 10 to Standards edit Owasp Top 10 2017 PCI 88
draft
5 BeyondCorp for internal Web Applications edit Research 98
draft
6 Browser Security edit Browsers 22
draft
7 Bug Bounty Playbook edit Security Playbooks 87
review-content
8 CTFs edit Education Bjoern Kimminich 108
draft
9 Cheat Sheets edit Owasp Projects Marc Rimbau 66
more-content
10 Create Jira Workflows for Security Playbooks edit Security Playbooks Jira Irene Michlin 87
review-content
11 Creating AppSec Talent (next 100k professionals) edit Education 121
review-content
12 Cross-Company Hackathons edit Security Crowdsourcing 169
draft
13 Crowdsourcing Security Knowledge edit Security Crowdsourcing 228
review-content
14 Diffing and Version Control Threat Models edit Threat Model Irene Michlin 51
draft
15 DoS Playbook edit Security Playbooks 98
review-content
16 Docker Security edit DevSecOps Timo Pagel 19
draft
17 Due Diligence Playbook edit Security Playbooks Mamta Vuppu 57
review-content
18 Future of .Net Containers edit Research .Net , Docker PhotoBox 60
review-content
19 GDPR and DPO AppSec implications edit CISO GDPR Dinis Cruz,Francois Raynaud, Phil Parker 140
review-content
20 GSMA IoT Security Guidelines edit IoT 102
draft
21 GraphQL Security Review edit Research PhotoBox 116
review-content
22 How is the Top 10 Used in Real World edit Owasp Top 10 2017 54
draft
23 Incident Response Playbook edit Security Playbooks SOC Mamta Vuppu 93
review-content
24 Integrating Security Tools in the SDL edit DevSecOps SAST 32
draft
25 Internal Bug Bounties Programmes edit Security Crowdsourcing 206
draft
26 LANGSEC Language-theoretic Security edit Research 227
draft
27 Lessons learned from public bug bounties programmes edit Security Crowdsourcing 111
draft
28 Media Handling Playbook edit Security Playbooks GDPR 88
review-content
29 Netflix Resilience Engineering edit DevSecOps Neil Barlow,Dicky Stafford 68
draft
30 Netflix Security Automation edit DevSecOps Neil Barlow,Dicky Stafford,Francois Raynaud,Timo Pagel 85
draft
31 NextGen Security Scanners edit Tools Bjoern Kimminich,Marc Rimbau 138
done
32 Node Security Round Table edit DevSecOps 94
review-content
33 OWASP Bug Bounty edit Security Crowdsourcing 47
more-content
34 Owasp-Website edit Owasp 106
draft
35 Playbooks Common Format edit Security Playbooks Yan Kravchenko 93
improve-content
36 Playbooks vs Handbooks edit Security Playbooks 143
review-content
37 Protobuf for Data Validation Between Services edit Research 78
draft
38 Radical Candor edit 103
review-content
39 Ransomware Playbook edit Security Playbooks 147
review-content
40 SRE Security Activities edit DevSecOps Don Gibson 31
draft
41 Best practices in using SAST, DAST, IAST and RASP Tools edit Tools SAST Marc Rimbau,Felipe Zipitria,Avi Douglen, Timo Pagel 122
draft
42 Scaling Static Analysis Reviews and Deployments edit Tools SAST Avi Douglen, Robert Morschel 72
review-content
43 Threat Modeling Scaling edit Threat Model Robert Hurlbut, Irene Michlin, Mamta Vuppu 69
review-content
44 Security Architecture Recommendations for IoT edit IoT 13
draft
45 Security Book Club edit Education Dinis Cruz,Bjoern Kimminich 77
review-content
46 Security Champions edit Agile AppSec Francois Raynaud 219
review-content
47 Security Crowdsourcing the SDL Practices edit Security Crowdsourcing 13
draft
48 Security Guidance and Feedback in IDE edit DevSecOps IDE , SAST 93
review-content
49 Security Labels edit Research Dinis Cruz 31
draft
50 Security Monitoring Playbooks edit Security Playbooks 169
review-content
51 Security Playbooks Diagrams edit Security Playbooks 126
review-content
52 Security-Review-pure-Javascript-Applications edit 13
draft
53 Synchronize Multiple Owasp Top 10s edit Owasp Top 10 62
draft
54 Threat Modeling Diagramming Techniques edit Threat Model 13
draft
55 Threat Modeling IoT Devices edit Threat Model IoT 35
draft
56 Threat Modeling Schema edit Threat Model 18
draft
57 Threat Modeling Tools edit Threat Model Geoff Hill, Irene Michlin, Robert Morschel, Mamta Vuppu, Stephen de Vries 105
review-content
58 Threat Modeling Where do I Start? edit Threat Model Robert Hurlbut, Irene Michlin, Mamta Vuppu 98
review-content
59 Threat Modeling by Feature and Layer edit Threat Model 13
draft
60 Threat Modeling pure Javascript Applications edit Threat Model 13
draft
61 Top 10 merge with Proactive Controls edit Owasp Top 10 2017 26
draft
62 Use Threat Models to Lock Developers Briefs edit Threat Model 13
draft
63 Using Holacracy in Working Sessions edit 73
improve-content
64 Using JIRA and Confluence to Store Threat Model Data edit Threat Model 13
draft
65 What Should be Added to the Top 10 edit Owasp Top 10 2017 Katy Anton 129
review-content
66 Women in Cyber edit Neil Barlow,ade yoseman putra,Francois Raynaud,Lisa Raynaud 273
Done