- Agile practices for security teams ( )
- Creating a Generic Diagram of a Threat Model ( )
- DevSecOps Secrets Management ( )
- How Do We Save Information From the TM Slack Channel ( )
- Introduction to Cynefin Framework ( )
- Juice Shop Challenge Refactoring ( )
- Juice Shop Hack'n'Code (Mon) ( )
- Juice Shop Hack'n'Code-Wed ( )
- Juice Shop Hack’n’Code (Tue) ( )
- Juice Shop Release Night ( )
- Keynote presentation by Simon Wardley ( )
- Lightweight Privacy Threat Modelling using LINDDUN ( )
- OWASP Application Security Curriculum Project ( )
- OWASP DevSecOps Cheat Sheet ( )
- OWASP SAMM Measurements ( )
- OWASP Web Honeypot Project ( )
- Real World Chaos Engineering ( )
- SAMM - Alignment with Threat Modelling ( )
- SAMM - Benchmarking and Tooling ( )
- SAMM - Defined Writing Guidelines for Questions and Quality Criteria ( )
- SAMM - Editing agreements and parallel editing ( )
- SAMM - Model Challenges ( )
- SAMM - Model Challenges (Wed) ( )
- SAMM - Parallel Editing ( )
- SAMM - Parallel editing, Model discussions, DevSecOps ( )
- SAMM - Parallel editing-Thurs ( )
- SAMM Model Discussions ( )
- Security Challenges - An Introduction ( )
- Security Challenges - Next step ( )
- State and Future of Threat Modeling ( )
- Threat Model - Lessons Learned ( )
- Threat Model Cookbook Project (Part 2) ( )
- Threat Model Maturity ( )
- Threat Modelling Data Schema ( )
- Threat Modelling Project Roadmap ( )
- Wardley Maps for Security ( )
- Working towards a unified way of describing threat models ( )
You can check out the outcomes from our previous summit.
See the 2018 summit outcomes