Continuum Security Sponsors the Open Security Summit

 | Conferences, SecDevOps

We’re delighted to announce we are Gold Sponsors of the upcoming Open Security Summit taking place near London on the 4th-8th June. The summit has a unique focus on active collaboration in attendee driven workshops, rather than a speaker driven conference.

Here’s a little about the conference:

The Open Security Summit 2018 is focused on the collaboration between Developers and Application Security.

Using the same model as the previous OWASP Summits, this 5-day event will be a high-energy experience, during which attendees get the chance to work and collaborate intensively. This is not a conference with uni-directional presentations. Every thoroughly prepared working session is geared towards a specific Application Security challenge and will be focused on actionable outcomes.

If you care about Application Security and want to collaborate with the key players in this industry, this is the event to be at.

The schedule for the summit is now online and there’s a whole raft of superb tracks to choose from including: Chaos Engineering, OWASP SAMM, DevSecOps, GDPR and of course Threat Modeling, which we will be heavily involved with.

There’s a stellar list of attendees available here including our CEO Stephen de Vries and Adam Shostack from our advisory board.

We hope to see you there!


Did you like this article?

  • Schedule a meeting with Continuum Security at Def Con 2018
    Schedule a meeting with Continuum Security at Def Con 2018Our CTO Paul Santapau will be in attendance at the upcoming Def Con conference in Las Vegas August 9th-12th. Please do let us know if you would like to schedule a meeting with Paul to discuss all things DevSecOps and our IriusRisk threat modeling platform – including new features and future development.   If you’re […]READ MORE
  • Build GDPR Compliance into Your Applications with IriusRisk
    Build GDPR Compliance into Your Applications with IriusRiskBack in June I wrote some practical guidance on GDPR and application security and made the following comments: … many applications we develop have commonalities, we are able to create architectural risk patterns that can be applied to other applications. The key to simplification is to break down the application into individual architectural patterns – for […]READ MORE
  • BDD-Security now available in Docker
    BDD-Security now available in DockerBDD-Security is now easier to configure and launch from a Docker container. Because BDD-Security stores most of its configuration inside a config file (config.xml), it was cumbersome to change the parameters when launching the Docker container. To solve this we have now made it easier by allowing all of the config.xml attributes to be set […]READ MORE