Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit 087c21e

Browse files
feat: enhance workshop descriptions
1 parent eb03a6a commit 087c21e

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

‎src/assets/Markdown Files/userday.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,9 +31,9 @@ While briefly touching on foundational elements, the presentation focuses on dev
3131
Get to know the DSOMM application and how to customize it to distribute your AppSec Program as a maturity model.
3232

3333
Requirements:
34+
- Laptop
3435
- Docker
35-
36-
Linux is recommended.
36+
- Linux is recommended
3737

3838
### Workshop: Application and Vulnerability maturity Model (VMM) - DSOMM Map
3939
Organizations face an ever-increasing risk of cyberattacks and data breaches. Vulnerabilities are getting discovered faster than ever, with a 34% YoY increase of vulnerability discovery. Vulnerabilities are often tackled as they come from security scanners, leading to burnout of security professionals, with 50% of security engineers considering changing their profession entirely. This workshop explores the vulnerability management process that applies to application, cloud, and infrastructure security.
@@ -43,3 +43,9 @@ To mitigate these risks, vulnerability management and triage have become essenti
4343
Why we created the vulnerability management process?
4444
We created the vulnerability maturity model to provide a quick and easy assessment method to define where you are in the vulnerability assessment process from triage.
4545
The VMM is mapped back to both SAMM, and DSOMM.
46+
47+
Requirements:
48+
- Laptop
49+
- An outline of your organization's software development lifecycle (real or hypothetical)
50+
- Examples of potential security vulnerabilities relevant to your organization (real or hypothetical)
51+

0 commit comments

Comments
(0)

AltStyle によって変換されたページ (->オリジナル) /