conference

Talk - Purple Teaming with OWASP purpleteam

This talk covers: What is OWASP PurpleTeam? Why you would want it in your build pipelines. How you go about setting it up? What the work-flows look like, along with the recent donation of the cloud environment to OWASP.

Workshop - Automated Security Regression Testing for Web Apps and APIs with OWASP PurpleTeam

Let's get your Web Apps and APIs under security regression testing with OWASP PurpleTeam.

Talk - Purple Teaming with OWASP purpleteam

This talk covers: What is OWASP PurpleTeam? Why you would want it in your build pipelines. How you go about setting it up? What the work-flows look like.

Talk - Dev Team Security: Back to the Future

This talk visits: The past, present and future of how our Development Teams have and will measure the security maturity of the software delivered.

Talk - Purple Teaming with OWASP purpleteam

This talk covers: What is OWASP PurpleTeam? Why you would want it in your build pipelines. How you go about setting it up? What the work-flows look like.

Talk - Purple Teaming with OWASP purpleteam

This talk covers: What is OWASP PurpleTeam? Why you would want it in your build pipelines. How you go about setting it up? What the work-flows look like.

Talk - Purple Teaming with OWASP purpleteam

This talk covers: What is OWASP PurpleTeam? Why you would want it in your build pipelines. How you go about setting it up? What the work-flows look like.

Talk - Building PurpleTeam (a Security Regression Testing SaaS) - From PoC to Alpha

Developers / Engineers know that a build pipeline is an essential part of creating robust and reliable software, but what to put in it? This talk covers the creation of purpleteam from PoC to Alpha release, and why it’s an ideal fit for the security regression testing slot of your build pipeline.

Workshop - Init Security Titans

Workshop to initialise, train and deploy the Jade Security Champions across the Jade Development Teams.

Talk - Hardening Your Docker Infrastructure

The security defaults of Docker are designed to get you up and running (“just work”) quickly, rather than being the most secure. There are many default configurations that can be improved upon. In this talk Kim will walk through improving the security of Docker hosts, containers, networking and deployments.