sectest consultant, Visma

Participant's team(s):
Aurelijus Stanislovaitis Daily Schedule
| Monday | Tuesday | Wednesday | Thursday | Friday | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
| |||||||||||||||
|
|
|
| ||||||||||||||
|
|
|
|
| |||||||||||||
|
|
|
|
| |||||||||||||
|
|
|
|
Participating sessions details
| Title | Description | type | When | Time | Acting as |
|---|---|---|---|---|---|
| Threat model track opening session | Threat Modeling track opening | working-session | Mon | PM-1 | participant |
| Create Wardley Maps for multiple security scenarios | Practical session on creating [Wardley Maps] | working-session | Mon | PM-2 | participant |
| Update Treat Modeling website 1 | user-session | Mon | PM-3 | participant | |
| Threat model cheat sheets | Threat Modeling Working Session | working-session | Tue | AM-1 | participant |
| API Threat Modeling Cheat Sheet | API Threat Modeling Cheat Sheet | working-session | Tue | PM-1 | participant |
| Attack chains as TM technique | Threat Modeling Working Session | working-session | Tue | PM-2 | participant |
| Back to the future with Threat Modeling | Back to the future with Threat Modeling | working-session | Tue | PM-3 | participant |
| Update MSTG with changes in Android 8 (Oreo) | Mobile Security Working Session | working-session | Tue | PM-1, PM-2 | participant |
| Docker and Kubernetes Threat Modeling Cheat Sheet | Docker and Kubernetes Threat Modeling Cheat Sheet | working-session | Wed | PM-1 | participant |
| How to Threat Model Features with Questionnaires | How to Threat Model Features with Questionnaires | working-session | Wed | PM-2 | participant |
| Federated Login with Social Platforms Threat Modeling Cheat Sheet | Federated Login with Social Platforms Threat Modeling Cheat Sheet | working-session | Wed | PM-3 | participant |
| Thinking in Graphs | Keynote by Dinis Cruz | user-session | Wed | KN-2 | participant |
| Gamifying Security Dashboards | Keynote by Ante Gulam | user-session | Tue | KN-2 | participant |
| Update MSTG with changes in iOS 11 | Mobile Security Working Session | working-session | Wed | PM-2 | participant |
| Update MSTG with changes in Android 8 (Oreo) | Mobile Security Working Session | working-session | Tue | PM-1, PM-2 | participant |
| Application Security Verification Standard | Session on ASVS | working-session | Wed | AM-1 | participant |
| Using maps to define how to capture, detect and prevent 6 real-world security incidents | Hands on session on how to use Wardley maps | working-session | Tue | AM-1 | participant |
| AWS Lambda Security | How to secure Lambda functions | product-session | Wed | PM-1 | participant |
| Threat model guide | Threat model guide with levels | working-session | Thu | PM-1 | participant |
| How to scale Threat Modeling. | How to scale Threat Modeling | working-session | Thu | PM-2 | participant |
| Securing AWS S3 Buckets | product-session | Wed | PM-2 | participant | |
| Owasp Testing Guide v5 | Working Sessions for Owasp Testing Guide v5 | working-session | Thu | PM-2,PM-3 | participant |
| How to Threat Model Features with Questionnaires | How to Threat Model Features with Questionnaires | working-session | Wed | PM-2 | participant |
| Security Crowdsourcing | Working Sessions for Security Crowdsourcing | working-session | Tue | PM-3 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizersmetadata field (in this caseAurelijus Stanislovaitis)
Back to list of all Participants