diff --git a/src/assets/Markdown Files/userday.md b/src/assets/Markdown Files/userday.md index 754d8350..049c0b4a 100644 --- a/src/assets/Markdown Files/userday.md +++ b/src/assets/Markdown Files/userday.md @@ -31,9 +31,9 @@ While briefly touching on foundational elements, the presentation focuses on dev Get to know the DSOMM application and how to customize it to distribute your AppSec Program as a maturity model. Requirements: +- Laptop - Docker - -Linux is recommended. +- Linux is recommended ### Workshop: Application and Vulnerability maturity Model (VMM) - DSOMM Map Organizations face an ever-increasing risk of cyberattacks and data breaches. Vulnerabilities are getting discovered faster than ever, with a 34% YoY increase of vulnerability discovery. Vulnerabilities are often tackled as they come from security scanners, leading to burnout of security professionals, with 50% of security engineers considering changing their profession entirely. This workshop explores the vulnerability management process that applies to application, cloud, and infrastructure security. @@ -43,3 +43,9 @@ To mitigate these risks, vulnerability management and triage have become essenti Why we created the vulnerability management process? We created the vulnerability maturity model to provide a quick and easy assessment method to define where you are in the vulnerability assessment process from triage. The VMM is mapped back to both SAMM, and DSOMM. + +Requirements: +- Laptop +- An outline of your organization's software development lifecycle (real or hypothetical) +- Examples of potential security vulnerabilities relevant to your organization (real or hypothetical) +