Senior Software Engineer, Mimecast Ltd
Participant's team(s):
Florian Buetow Daily Schedule
| Monday | Tuesday | Wednesday | Thursday | Friday | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
|
| |||||||||||
|
|
|
| ||||||||||||
|
| ||||||||||||||
|
|
|
| ||||||||||||
|
|
|
|
Participating sessions details
| Title | Description | type | When | Time | Acting as |
|---|---|---|---|---|---|
| Towards a unified way of describing threat models | A presentation and discussion of a new language to describe a threat model | working-session | Thu | AM-1 | participant |
| Lightweight privacy threat modeling using LINDDUN | Lightweight privacy threat modeling using LINDDUN | working-session | Mon | PM-2 | participant |
| Introduction to Wardley Maps | New to Wardley maps? This session is for you | working-session | Mon | PM-1 | participant |
| Security Challenges - An Introduction | Introduction and overview | working-session | Mon | PM-2 | participant |
| Hand's on Wardley Maps creation | Want to have a go at creating your own Wardley maps? This training session will give you hands on experience in creating maps for multiple scenarios, with experienced practitioners on hand to guide and help you. | working-session | Mon | PM-3 | participant |
| Agile Practices for Security Teams | Agile Practices for Security Teams | working-session | Tue | AM-1 | participant |
| Security Challenges - Analysis, Analogies | Outcome | participant | |||
| Application Security Verification Standard | Session on ASVS | working-session | Wed | PM-1 | participant |
| Secrets Management | Secrets Management in a DevSecOps world | working-session | Wed | PM-1 | participant |
| Wardley Maps for Security | Practical session on using Wardley Maps for Security | user-session | Wed | PM-1 | participant |
| Using Wardley Maps and Cynefin for Security | An introduction to the Cynefin Framework, and its intersection with Wardley Maps, for Security | user-session | Wed | PM-2 | participant |
| Using Wardley Maps on SOC | user-session | Wed | PM-3 | participant | |
| Mapping boot camp | Wardely Mapping boot camp - Zero to Mapping Hero - By Simon Wardley | working-session | Thu | AM-1 | participant |
| Cell based Structures for Security | Cell based Structures for Security - Small autonomous security teams and the use of Pioneers, Settlers and Town Planners (PST) | working-session | Thu | PM-1 | participant |
| Wardley Mapping - Climatic Patterns and Using Doctrine | Wardley Mapping, Understanding Climatic Patterns and Using Doctrine | working-session | Thu | PM-2 | participant |
| Wardley Mapping - Coordinating functions within a PST organisation | Coordinating functions within a PST organisation | working-session | Thu | PM-3 | participant |
| State and future of threat modeling | What is the current state of TM and where do we need to go? | working-session | Wed | AM-1 | participant |
| How to scale Threat Modeling | |||||
| Writing security tests to confirm vulnerabilities and fixes | Hands on session writing security tests | user-session | Thu | PM-1 | participant |
| Scaling API Security | working-session | Thu | DS-3 | participant | |
| Security Challenges - Next step | Is this viable? Where do we go? | working-session | Fri | AM-1 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizersmetadata field (in this caseFlorian Buetow)
Back to list of all Participants