Participant's team(s):
Lauren Chiesa Daily Schedule
Monday | Tuesday | Wednesday | Thursday | Friday | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
| |||||||||||||
|
|
| ||||||||||||
|
|
|
| |||||||||||
|
|
|
| |||||||||||
|
|
|
| |||||||||||
|
|
Participating sessions details
Title | Description | type | When | Time | Acting as |
---|---|---|---|---|---|
Wardley Maps Training (#2) | New to Wardley maps? This session is for you | working-session | Mon | TS-4 | participant |
Threat Modeling Training (#3) | Training Threat Modeling (3rd session) | working-session | Mon | TS-5 | participant |
OWASP SAMM Training (#3) | Training OWASP SAMM (3rd session) | working-session | Mon | TS-6 | participant |
Security Challenges - An Introduction | Introduction and overview | working-session | Mon | PM-2 | participant |
Hand's on Wardley Maps creation | Want to have a go at creating your own Wardley maps? This training session will give you hands on experience in creating maps for multiple scenarios, with experienced practitioners on hand to guide and help you. | working-session | Mon | PM-3 | participant |
Introduction to Wardley Maps | New to Wardley maps? This session is for you | working-session | Mon | PM-1 | participant |
How do we persist the information from the TM Slack channel? | How do we persist the information from the TM Slack channel? | working-session | Tue | PM-1 | participant |
Creating a generic diagram of a threat model | Creating a generic diagram of a threat model | working-session | Tue | PM-1 | participant |
TM maturity | How do we measure the maturity of TM | working-session | Tue | PM-2 | participant |
Threat Model Cookbook Project (Part 1) | Kick off of the OWASP Threat Model Cookbook Project | working-session | Tue | PM-3 | participant |
Zap - How to use it | |||||
Juice Shop 101 | OWASP Juice Shop introduction for newbies | user-session | Tue | AM-1 | participant |
Security Data Science | Expect Graphs, and Jypiter notebooks ... | keynote | Tue | KN-1 | participant |
threat pattern libraries | |||||
Creating a Security Champions network | working-session | Wed | Eve-1 | participant | |
Integrating Security Tools in the SDL | Integrate security tools as part of CI/CD pipeline to find/fix issues early in SDL | working-session | Thu | AM-1,PM-1 | participant |
Cell based Structures for Security | Cell based Structures for Security - Small autonomous security teams and the use of Pioneers, Settlers and Town Planners (PST) | working-session | Thu | PM-1 | participant |
Securing the CI Pipeline | Secure the CI/CD pipeline | working-session | Thu | PM-2,PM-3 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizers
metadata field (in this caseLauren Chiesa
)
Back to list of all Participants