Adam Shostack

author, Shostack & Associates

Sponsored By:

Participant's team(s):

Adam Shostack Daily Schedule

Monday Tuesday Wednesday Thursday Friday
AM-1
10:30 - 12:30
Threat model cheat sheets
Kings room
Azure Security Features, Just a Few
Pedley room
DS-2
12:30 - 13:30
Time slot over-subscribed
A seat at the table
main-stage
PM-1
13:30 - 15:00
Threat model track opening session
Kings room
Time slot over-subscribed
API Threat Modeling Cheat Sheet
Kings room
Docker and Kubernetes Threat Modeling Cheat Sheet
Kings room
Threat model guide
Kings room
Share your Threat Models diagrams and create a Book
Kings room
PM-2
15:30 - 16:30
Time slot over-subscribed
Threat Modeling Website Structure
Kings room
Time slot over-subscribed
Attack chains as TM technique
Kings room
Time slot over-subscribed
How to Threat Model Features with Questionnaires
Kings room
How to scale Threat Modeling.
Kings room
Create generic TM for CMS
Kings room
PM-3
16:30 - 17:30
Time slot over-subscribed
Update Treat Modeling website 1
Kings room
Time slot over-subscribed
Back to the future with Threat Modeling
Kings room
Time slot over-subscribed
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Threat Model training through Gamification
Kings room
Threat model closing session
Kings room
Eve-1
19:30 - 21:00
Using a Rules Engine and Risk Patterns with IriusRisk
320 - Threat Modeling villa
Update Treat Modeling website 3
320 - Threat Modeling villa
Update Treat Modeling website 4
320 - Threat Modeling villa
Eve-2
21:00 - 23:00
Update Treat Modeling website 2
320 - Threat Modeling villa

Participating sessions details

Title Description type When Time Acting as
A seat at the table Keynote by Adam user-session Mon DS-2 participant
Threat model track opening session Threat Modeling track opening working-session Mon PM-1 participant
Threat Modeling Website Structure working-session Mon PM-2 participant
Update Treat Modeling website 1 user-session Mon PM-3 participant
Using a Rules Engine and Risk Patterns with IriusRisk During this session we’ll drive the attendants through the IriusRisk approach and the main core features of the solution. product-session Mon Eve-1 participant
Update Treat Modeling website 2 user-session Mon Eve-2 participant
Threat model cheat sheets Threat Modeling Working Session working-session Tue AM-1 participant
API Threat Modeling Cheat Sheet API Threat Modeling Cheat Sheet working-session Tue PM-1 participant
Attack chains as TM technique Threat Modeling Working Session working-session Tue PM-2 participant
Back to the future with Threat Modeling Back to the future with Threat Modeling working-session Tue PM-3 participant
Update Treat Modeling website 3 Threat Modeling User Session user-session Tue Eve-1 participant
Update Treat Modeling website 4 Threat Modeling User Session user-session Wed Eve-1 participant
How to Threat Model Features with Questionnaires How to Threat Model Features with Questionnaires working-session Wed PM-2 participant
How to scale Threat Modeling
Federated Login with Social Platforms Threat Modeling Cheat Sheet Federated Login with Social Platforms Threat Modeling Cheat Sheet working-session Wed PM-3 participant
Threat Model training through Gamification Threat Model training through Gamification working-session Thu PM-3 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Adam Shostack)


Back to list of all Participants