Information Security Consultant, dunnhumby Ltd
Participant's team(s):
Emma Fang Daily Schedule
Monday | Tuesday | Wednesday | Thursday | Friday | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
| ||||||||||||
|
|
|
| |||||||||||
|
|
|
| |||||||||||
|
|
|
Participating sessions details
Title | Description | type | When | Time | Acting as |
---|---|---|---|---|---|
Creating a generic diagram of a threat model | Creating a generic diagram of a threat model | working-session | Tue | PM-1 | participant |
TM maturity | How do we measure the maturity of TM | working-session | Tue | PM-2 | participant |
State and future of threat modeling | What is the current state of TM and where do we need to go? | working-session | Wed | AM-1 | participant |
Dealing with DevSecOps Findings | How to deal with the security findings in an appsec pipeline and drive continuous improvement of the testing policies | working-session | Wed | AM-1,PM-2,PM-3 | participant |
Secrets Management | Secrets Management in a DevSecOps world | working-session | Wed | PM-1 | participant |
Integrating Security Tools in the SDL | Integrate security tools as part of CI/CD pipeline to find/fix issues early in SDL | working-session | Thu | AM-1,PM-1 | participant |
From Threat Modeling to DevSecOps metrics | working-session | Thu | PM-1 | participant | |
Securing the CI Pipeline | Secure the CI/CD pipeline | working-session | Thu | PM-2,PM-3 | participant |
Wardley Maps for Security | Practical session on using Wardley Maps for Security | user-session | Wed | PM-1 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizers
metadata field (in this caseEmma Fang
)
Back to list of all Participants