Adam Shostack

author, Shostack & Associates

Sponsored By:

Participant's team(s):

Adam Shostack Daily Schedule

MondayTuesdayWednesdayThursdayFriday
AM-1
10:30 - 12:30
Threat model cheat sheets
Kings room
Azure Security Features, Just a Few
Pedley room
DS-2
12:30 - 13:30
Time slot over-subscribed
A seat at the table
main-stage
PM-1
13:30 - 15:00
Threat model track opening session
Kings room
Time slot over-subscribed
API Threat Modeling Cheat Sheet
Kings room
Docker and Kubernetes Threat Modeling Cheat Sheet
Kings room
Threat model guide
Kings room
Share your Threat Models diagrams and create a Book
Kings room
PM-2
15:30 - 16:30
Time slot over-subscribed
Threat Modeling Website Structure
Kings room
Time slot over-subscribed
Attack chains as TM technique
Kings room
Time slot over-subscribed
How to Threat Model Features with Questionnaires
Kings room
How to scale Threat Modeling.
Kings room
Create generic TM for CMS
Kings room
PM-3
16:30 - 17:30
Time slot over-subscribed
Update Treat Modeling website 1
Kings room
Time slot over-subscribed
Back to the future with Threat Modeling
Kings room
Time slot over-subscribed
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Threat Model training through Gamification
Kings room
Threat model closing session
Kings room
Eve-1
19:30 - 21:00
Using a Rules Engine and Risk Patterns with IriusRisk
320 - Threat Modeling villa
Update Treat Modeling website 3
320 - Threat Modeling villa
Update Treat Modeling website 4
320 - Threat Modeling villa
Eve-2
21:00 - 23:00
Update Treat Modeling website 2
320 - Threat Modeling villa

Participating sessions details

TitleDescriptiontypeWhenTimeActing as
A seat at the tableKeynote by Adamuser-sessionMonDS-2participant
Threat model track opening sessionThreat Modeling track openingworking-sessionMonPM-1participant
Threat Modeling Website Structureworking-sessionMonPM-2participant
Update Treat Modeling website 1user-sessionMonPM-3participant
Using a Rules Engine and Risk Patterns with IriusRiskDuring this session we’ll drive the attendants through the IriusRisk approach and the main core features of the solution.product-sessionMonEve-1participant
Update Treat Modeling website 2user-sessionMonEve-2participant
Threat model cheat sheetsThreat Modeling Working Sessionworking-sessionTueAM-1participant
API Threat Modeling Cheat SheetAPI Threat Modeling Cheat Sheetworking-sessionTuePM-1participant
Attack chains as TM techniqueThreat Modeling Working Sessionworking-sessionTuePM-2participant
Back to the future with Threat ModelingBack to the future with Threat Modelingworking-sessionTuePM-3participant
Update Treat Modeling website 3Threat Modeling User Sessionuser-sessionTueEve-1participant
Update Treat Modeling website 4Threat Modeling User Sessionuser-sessionWedEve-1participant
How to Threat Model Features with QuestionnairesHow to Threat Model Features with Questionnairesworking-sessionWedPM-2participant
How to scale Threat Modeling
Federated Login with Social Platforms Threat Modeling Cheat SheetFederated Login with Social Platforms Threat Modeling Cheat Sheetworking-sessionWedPM-3participant
Threat Model training through GamificationThreat Model training through Gamificationworking-sessionThuPM-3participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Adam Shostack)


Back to list of all Participants