• OWASP/CIAOA Workshop

    At Infosecurity North America the Open Web Application Security Project (OWASP) and the Critical Infrastructure Association of America, Inc. (CIAOA) will be conducting workshop sessions and a book signing activity with Brook S. E. Schoenfield author of “Securing Systems: Applied Security Architecture and Threat Models”.

    When: One hour sessions run from 11am - 4pm, Wednesday November 14th

    Where: C102/3, Infosecurity North America Expo Hall
  • Sessions:

    • 11am - Are Women in Software Security from Venus or Mars? - this session will discuss the journey and technical contributions by women in application security globally and locally with a leadership panel from the Woman In AppSec, OWASP Committee. We need bright, inquiring, collaborative minds now more than ever. This session is not to be missed by anyone seeking to have a career in the software industry.


    • Zoe Braiterman, Women in AppSec Committee Chair, OWASP Foundation


    • Melanie Kauffman, Build Engineer, Verizon Wirless
      Anita D'Amico, CEO, Code Dx
      Evie Borthwick, Project Manager, Consultant Project Management Expert
      Krista Valenzuela, Senior Cyber Threat Intelligence Analyst, New Jersey Cybersecurity & Communications Integration Cell


    • 12pm - A Victims Story - this session will describe the journey of a cybersecurity professional who lost everything including a multimillion dollar company. This VICTIM will describe his experience and the Einstein moment. *comic book signing following this presentation.

      Gary Berman, CEO, Berman


    • 1pm - 2pm - Lunch


    • 2pm - Threat Modeling - threat modeling, a key technique for architecting and designing systems securely. This talk leverages insights to offer effective ways to better integrate threat modeling and provides a great resource for organizations that are looking to integrate threat modeling into their own development processes and teams. *book signing following this presentation

      Brook S.E. Schoenfield, Author


    • 3pm - Supply Chain Risk Management - this session will describe and demonstrate passive and active analysis of internet connected devices and systems. Learn how to obtain a security score of your business attack surface and leverage a workbench that can help you find bugs and flaws faster and quicker the ever before.

      Alex Hied, Chief Research Officer & Development Officer, SecurityScorecard
      Tom Brennan, CREST International, IOActive

    full session information

    In addition...

    4pm - 7pm - CMD+CTRL Web Application Security CTF
    Want to test your skills in identifying web app vulnerabilities? Join the CMD+CTRL cyber range, a unique, immersive environment where players exploit their way through hundreds of vulnerabilities that lurk in business applications today. Success means learning quickly that attack and defense is all about thinking on your feet.

    For each vulnerability you uncover, you are awarded points. Climb the interactive leaderboard for a chance to win fantastic prizes! CMD+CTRL is ideal for development teams to train and develop skills, but anyone involved in keeping your organization’s data secure can play - from developers and managers and even CISOs.

  • Want to participate?

    If you haven't got your visitor pass yet, simply register for your pass for Infosecurity North America, and tick the box on the registration form to indicate you are interested in the OWASP/CIAOA Workshop and/or the CMD+CTRL Cyber Range.

    get my pass

    If you already have your visitor pass, use our quick form to register your interest for the OWASP/CIAOA Workshop and/or the CMD+CTRL Cyber Range so we can contact you to book your place.

    I've already got my pass

  • Thinking of visiting?

    Time is running out! Register today, you're just a few steps away.

    Register now

    What else is happening?

    Check out what else there is to see and do.

    see more

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.