Information Security Consultant, dunnhumby Ltd
Participant's team(s):
Emma Fang Daily Schedule
| Monday | Tuesday | Wednesday | Thursday | Friday | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
| ||||||||||||
|
|
|
| |||||||||||
|
|
|
| |||||||||||
|
|
|
Participating sessions details
| Title | Description | type | When | Time | Acting as |
|---|---|---|---|---|---|
| Creating a generic diagram of a threat model | Creating a generic diagram of a threat model | working-session | Tue | PM-1 | participant |
| TM maturity | How do we measure the maturity of TM | working-session | Tue | PM-2 | participant |
| State and future of threat modeling | What is the current state of TM and where do we need to go? | working-session | Wed | AM-1 | participant |
| Dealing with DevSecOps Findings | How to deal with the security findings in an appsec pipeline and drive continuous improvement of the testing policies | working-session | Wed | AM-1,PM-2,PM-3 | participant |
| Secrets Management | Secrets Management in a DevSecOps world | working-session | Wed | PM-1 | participant |
| Integrating Security Tools in the SDL | Integrate security tools as part of CI/CD pipeline to find/fix issues early in SDL | working-session | Thu | AM-1,PM-1 | participant |
| From Threat Modeling to DevSecOps metrics | working-session | Thu | PM-1 | participant | |
| Securing the CI Pipeline | Secure the CI/CD pipeline | working-session | Thu | PM-2,PM-3 | participant |
| Wardley Maps for Security | Practical session on using Wardley Maps for Security | user-session | Wed | PM-1 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizersmetadata field (in this caseEmma Fang)
Back to list of all Participants