From c9da2e92ad0e0b4d539853839ee19ab98173922f Mon Sep 17 00:00:00 2001 From: Johan Sydseter Date: Wed, 4 Mar 2026 18:29:22 +0100 Subject: [PATCH 1/2] Add link to CyberSec Games blog post about Max --- cornucopia.owasp.org/data/website/pages/play/en/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cornucopia.owasp.org/data/website/pages/play/en/index.md b/cornucopia.owasp.org/data/website/pages/play/en/index.md index dc73471ad..bd1338524 100644 --- a/cornucopia.owasp.org/data/website/pages/play/en/index.md +++ b/cornucopia.owasp.org/data/website/pages/play/en/index.md @@ -43,7 +43,7 @@ See Márk Vinkovits leading a threat modelling ["talk and group session"](https: ## Gameplay using abuse case modelling approach -Long-time project contributor Max Alejandro Gómez Sánchez Vergaray has created a video to explain how he has trained hundreds of teams to use OWASP Cornucopia in abuse case modelling sessions at a major international bank. This approach has scaled to over two-thousand developers to date. +Long-time project contributor Max Alejandro Gómez Sánchez Vergaray has created a video to explain how he has trained hundreds of teams to use OWASP Cornucopia in abuse case modelling sessions at a major international bank. This approach has scaled to over two-thousand developers to date. You can read more about this approach in CyberSec Games blog post on LinkedIn: ["Identifying abuse before designing architecture: Embedding Game-Based Threat Modelling into Agile Delivery at a Major Latin American Bank"](https://www.linkedin.com/pulse/identifying-abuse-before-designing-architecture-embedding-zmnhe/?trackingId=yG%2Fkt5faRJCwW8eMo%2BwkqA%3D%3D).