owasp summit small logo

Summit Schedule for Wednesday (by Room)

Summit Schedule for Wednesday (by Room) schedule (Wed)



location

AM 1

10:30 to 12:30 (2h)

PM 1

13:30 to 15:00 (1.5h)

PM 2

15:30 to 16:30 (1h)

PM 3

16:30 to 17:30 (1h)

DS-1

18:00 to 19:45 (1:45h)

Evening

20:30 to 23:59 (3.5h)
Kings
Room-1
Security Guidance and Feedback in IDE
DevSecOps
Threat and Vulnerability Management Playbook
DevSecOps
Writing Security Tests
DevSecOps
JIRA Risk Workflow
DevSecOps
Portland
Room-2
Securing GitHub Integrations
DevSecOps
Larch
Room-3
OWASP Bug Bounty
Security Crowdsourcing
Software Defined Everything (SDx)
Education
Owasp Orizon Reboot
Owasp Projects
ZAP
Owasp Projects
Montague
Room-4
CISO Round Table
CISO
InfoSec Warranties and Guarantees
CISO
Application Security Guide for CISO
CISO
Cyber Insurance
CISO
Maulden
Room-5
AppSec Review and Pentest Playbook
Security Playbooks
Incident Response Playbook
Security Playbooks
Media Handling Playbook
Security Playbooks
Security Monitoring Playbooks
Security Playbooks
Pedley
Room-6
Application Security BSc/Masters Curriculum Design
Education
ELK Security Dashboards
DevSecOps
Securing Legacy Applications
DevSecOps
Dynamic Sessions (Main Room)
Main-Room
A7 - Insufficient Attack Protection
Owasp Top 10 2017
AppSec for CISOs
CISO
Cross-Company Hackathons
Security Crowdsourcing
Diffing and Version Control Threat Models
Threat Model
Lessons learned from public bug bounties programmes
Security Crowdsourcing
Owasp Chapter Treasury
Owasp
OwaspSamm Villa (OK311)
Villa-1
SAMM - Dataset Project
OwaspSAMM
SAMM - Core Model Update 3 - Implementation
OwaspSAMM
SAMM - Outreach and Marketing
OwaspSAMM
SAMM - Standards and Compliance Mapping
OwaspSAMM
SAMM - core model placeholder
OwaspSAMM
Mobile Project Villa (OK310)
Villa-2
MSTG Book Sprint - Android Testing Guide
Mobile Security
MSTG Book Sprint - Android Testing Guide
Mobile Security
MSTG Book Sprint - Android Testing Guide
Mobile Security
MSTG Book Sprint - Android Testing Guide
Mobile Security
The Future of Privacy
CISO
Threat Model Villa (OK312)
Villa-4
Threat Modeling OWASP Pages
Threat Model
Threat Modeling Templates
Threat Model
Threat Modeling Cheat Sheet & Lightweight Threat Modeling (Part I)
Threat Model
Threat Modeling Scaling and Security Champions
Threat Model
Threat Modeling Cheat Sheet & Lightweight Threat Modeling (Part II)
Threat Model
Hands on Threat Modeling Juice Shop (Attacking 2)
Threat Model
Juice Shop Villa (OK313)
Villa-5
Juice Shop Coding Day
Juice Shop
Juice Shop Coding Day
Juice Shop
Juice Shop Coding Day
Juice Shop
Juice Shop Coding Night
Juice Shop
Review of Docker a Security Workshop
DevSecOps
DevSecCon Villa (OK314)
Villa-3
GPG Infrastructure for OWASP
Owasp
Webgoat
Owasp Projects
Hackathon Daily Sessions
Security Crowdsourcing
Hackathon on avatao - Beyond OWASP Top Ten
Education
Testing Guide Villa (OK315)
Villa-6
OWASP Project Alignment (Top 10, ASVS)
Owasp Testing Guide v5
OWASP Project Alignment (ASVS, Testing Checklist)
Owasp Testing Guide v5
Risk Rating Methodology review
Owasp Testing Guide v5
Risk Rating Methodology review
Owasp Testing Guide v5
no-location