Senior Software Engineer, Mimecast Ltd
Participant's team(s):
Florian Buetow Daily Schedule
Monday | Tuesday | Wednesday | Thursday | Friday | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
|
| |||||||||||
|
|
|
| ||||||||||||
|
| ||||||||||||||
|
|
|
| ||||||||||||
|
|
|
|
Participating sessions details
Title | Description | type | When | Time | Acting as |
---|---|---|---|---|---|
Towards a unified way of describing threat models | A presentation and discussion of a new language to describe a threat model | working-session | Thu | AM-1 | participant |
Lightweight privacy threat modeling using LINDDUN | Lightweight privacy threat modeling using LINDDUN | working-session | Mon | PM-2 | participant |
Introduction to Wardley Maps | New to Wardley maps? This session is for you | working-session | Mon | PM-1 | participant |
Security Challenges - An Introduction | Introduction and overview | working-session | Mon | PM-2 | participant |
Hand's on Wardley Maps creation | Want to have a go at creating your own Wardley maps? This training session will give you hands on experience in creating maps for multiple scenarios, with experienced practitioners on hand to guide and help you. | working-session | Mon | PM-3 | participant |
Agile Practices for Security Teams | Agile Practices for Security Teams | working-session | Tue | AM-1 | participant |
Security Challenges - Analysis, Analogies | Outcome | participant | |||
Application Security Verification Standard | Session on ASVS | working-session | Wed | PM-1 | participant |
Secrets Management | Secrets Management in a DevSecOps world | working-session | Wed | PM-1 | participant |
Wardley Maps for Security | Practical session on using Wardley Maps for Security | user-session | Wed | PM-1 | participant |
Using Wardley Maps and Cynefin for Security | An introduction to the Cynefin Framework, and its intersection with Wardley Maps, for Security | user-session | Wed | PM-2 | participant |
Using Wardley Maps on SOC | user-session | Wed | PM-3 | participant | |
Mapping boot camp | Wardely Mapping boot camp - Zero to Mapping Hero - By Simon Wardley | working-session | Thu | AM-1 | participant |
Cell based Structures for Security | Cell based Structures for Security - Small autonomous security teams and the use of Pioneers, Settlers and Town Planners (PST) | working-session | Thu | PM-1 | participant |
Wardley Mapping - Climatic Patterns and Using Doctrine | Wardley Mapping, Understanding Climatic Patterns and Using Doctrine | working-session | Thu | PM-2 | participant |
Wardley Mapping - Coordinating functions within a PST organisation | Coordinating functions within a PST organisation | working-session | Thu | PM-3 | participant |
State and future of threat modeling | What is the current state of TM and where do we need to go? | working-session | Wed | AM-1 | participant |
How to scale Threat Modeling | |||||
Writing security tests to confirm vulnerabilities and fixes | Hands on session writing security tests | user-session | Thu | PM-1 | participant |
Scaling API Security | working-session | Thu | DS-3 | participant | |
Security Challenges - Next step | Is this viable? Where do we go? | working-session | Fri | AM-1 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizers
metadata field (in this caseFlorian Buetow
)
Back to list of all Participants