VISA
Participating sessions details
Title | Description | type | When | Time | Acting as |
---|---|---|---|---|---|
Automated Threat Hunting Project Collaboration | |||||
Agile Practices for Security Teams | Agile Practices for Security Teams | working-session | Tue | AM-1 | participant |
Integrating Security Tools in the SDL | Integrate security tools as part of CI/CD pipeline to find/fix issues early in SDL | working-session | Thu | AM-1,PM-1 | participant |
Scaling API Security | working-session | Thu | DS-3 | participant | |
Security Challenges - Analyse others | What strategies are already in use? | working-session | Wed | AM-1 | participant |
Creating a Threat Library | Threat Library Working Session | working-session | participant | ||
Creating a generic diagram of a threat model | Creating a generic diagram of a threat model | working-session | Tue | PM-1 | participant |
How do we persist the information from the TM Slack channel? | How do we persist the information from the TM Slack channel? | working-session | Tue | PM-1 | participant |
Incremental Threat Modeling | How to scale Threat Modeling | working-session | Thu | PM-1 | participant |
Lightweight privacy threat modeling using LINDDUN | Lightweight privacy threat modeling using LINDDUN | working-session | Mon | PM-2 | participant |
Lightweight privacy threat modeling using LINDDUN Part II | Lightweight privacy threat modeling using LINDDUN Part II | working-session | Mon | PM-3 | participant |
SAMMv2 - Threat Modeling | Discuss the SAMM threat modeling practice together with the SAMM team | working-session | Thu | PM-2 | participant |
State and future of threat modeling | What is the current state of TM and where do we need to go? | working-session | Wed | AM-1 | participant |
TM maturity | How do we measure the maturity of TM | working-session | Tue | PM-2 | participant |
TM track introduction | Introduction of the TM track and way of working for this week | working-session | Mon | PM-1 | participant |
Threat Model Examples Project | |||||
Towards a unified way of describing threat models | A presentation and discussion of a new language to describe a threat model | working-session | Thu | AM-1 | participant |
Hand's on Wardley Maps creation | Want to have a go at creating your own Wardley maps? This training session will give you hands on experience in creating maps for multiple scenarios, with experienced practitioners on hand to guide and help you. | working-session | Mon | PM-3 | participant |
Introduction to Wardley Maps (Training Session) | |||||
Mapping boot camp | Wardely Mapping boot camp - Zero to Mapping Hero - By Simon Wardley | working-session | Thu | AM-1 | participant |
Wardley Mapping - Climatic Patterns and Using Doctrine | Wardley Mapping, Understanding Climatic Patterns and Using Doctrine | working-session | Thu | PM-2 | participant |
Wardley Maps for Security | Practical session on using Wardley Maps for Security | user-session | Wed | PM-1 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizers
metadata field (in this caseVinod Anandan
)
Back to list of all Participants