Blog

Summit blog with latest news, thinking and participant's posts.

I am organizing the main working session around the Juice Shop vulnerable webapp. To get the most out of the summit for the project, I would like to give you some background on the session agenda and its intended outcome: I’ve been assembling all...
I had a couple emails about the Summit schedule which seem to imply that it was the final version, and that changes would be hard to make. Just to be very clear. The final schedule will most likely only be published a couple days before the Summi...
As you can see by the Summit Schedule one of the nice problems that Participants will have is going to be: how to select which Working Sessions to attend. The Summit will create a highly focused and energized environment where each Participant is...
Summit Participants, now that we have a first pass at the Summit Schedule, we really need you to update your Participant page with the Working Sessions that you want to be involved in. Here are the individual Track’s schedule Here is the consoli...
Summit Participants, the success of the Summit depends on the amount of talent that we are able bring together. Although the current list of Participants is already quite impressive, I’m sure we can do better, and bring even more talent to the Su...
While at AppSec EU in Belfast Seba recorded a quick interview with Mark Miller who runs the OWASP 24/7 Podcast You can listen to it at https://soundcloud.com/owasp-podcast/less-than-10-minutes-series-owasp-summit-2017
After a conversation with Ante Gulam about Security Playbooks, I had the real-world experience of needing them in multiple occasions this week. Since I was not able to find good resources online that I could easily use, I realised that the Summit...
In 30 days (12 June) Owasp will host its 2017 Global Summit in London where hundreds of participants will join forces in Working Sessions focused on solving hard Application and Cyber Security problems. This is not a conference with unidirectiona...
When you attend numerous conferences throughout your career, both as an attendee or as a speaker you kinda get dragged into this model where most of the events are following this traditional one-to-many model and one starts questioning the actual ...
FAQ based on email sent in response to a couple questions from one of the companies in the Security Crowdsourcing space. I think the Summit is great opportunity to really explore the power of Crowdsourcing Security, in an environment where the ...
If you are wondering how the Working sessions will be organized at the Summit, here is an explanation of how it will work. At the moment it might look a bit weird the fact that we have more Working Sessions (106) than participants (81). This is a...