Aurelijus Stanislovaitis

sectest consultant, Visma

Participant's team(s):

Aurelijus Stanislovaitis Daily Schedule

Monday Tuesday Wednesday Thursday Friday
KN-2
9:40 - 9:55
Gamifying Security Dashboards
main-stage
Thinking in Graphs
main-stage
AM-1
10:30 - 12:30
Time slot over-subscribed
Threat model cheat sheets
Kings room
Using maps to define how to capture, detect and prevent 6 real-world security incidents
Larch room
Application Security Verification Standard
314 - Owasp Projects villa
Azure Security Features, Just a Few
Pedley room
PM-1
13:30 - 15:00
Threat model track opening session
Kings room
Time slot over-subscribed
API Threat Modeling Cheat Sheet
Kings room
Update MSTG with changes in Android 8 (Oreo)
314 - Owasp Projects villa
Time slot over-subscribed
Docker and Kubernetes Threat Modeling Cheat Sheet
Kings room
AWS Lambda Security
Portland room
Threat model guide
Kings room
PM-2
15:30 - 16:30
Create Wardley Maps for multiple security scenarios
Larch room
Time slot over-subscribed
Attack chains as TM technique
Kings room
Time slot over-subscribed
How to Threat Model Features with Questionnaires
Kings room
Update MSTG with changes in iOS 11
314 - Owasp Projects villa
Securing AWS S3 Buckets
Portland room
Time slot over-subscribed
How to scale Threat Modeling.
Kings room
Owasp Testing Guide v5
314 - Owasp Projects villa
PM-3
16:30 - 17:30
Update Treat Modeling website 1
Kings room
Time slot over-subscribed
Back to the future with Threat Modeling
Kings room
Security Crowdsourcing
313 - DevSecCon villa
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room

Participating sessions details

Title Description type When Time Acting as
Threat model track opening session Threat Modeling track opening working-session Mon PM-1 participant
Create Wardley Maps for multiple security scenarios Practical session on creating [Wardley Maps] working-session Mon PM-2 participant
Update Treat Modeling website 1 user-session Mon PM-3 participant
Threat model cheat sheets Threat Modeling Working Session working-session Tue AM-1 participant
API Threat Modeling Cheat Sheet API Threat Modeling Cheat Sheet working-session Tue PM-1 participant
Attack chains as TM technique Threat Modeling Working Session working-session Tue PM-2 participant
Back to the future with Threat Modeling Back to the future with Threat Modeling working-session Tue PM-3 participant
Update MSTG with changes in Android 8 (Oreo) Mobile Security Working Session working-session Tue PM-1, PM-2 participant
Docker and Kubernetes Threat Modeling Cheat Sheet Docker and Kubernetes Threat Modeling Cheat Sheet working-session Wed PM-1 participant
How to Threat Model Features with Questionnaires How to Threat Model Features with Questionnaires working-session Wed PM-2 participant
Federated Login with Social Platforms Threat Modeling Cheat Sheet Federated Login with Social Platforms Threat Modeling Cheat Sheet working-session Wed PM-3 participant
Thinking in Graphs Keynote by Dinis Cruz user-session Wed KN-2 participant
Gamifying Security Dashboards Keynote by Ante Gulam user-session Tue KN-2 participant
Update MSTG with changes in iOS 11 Mobile Security Working Session working-session Wed PM-2 participant
Update MSTG with changes in Android 8 (Oreo) Mobile Security Working Session working-session Tue PM-1, PM-2 participant
Application Security Verification Standard Session on ASVS working-session Wed AM-1 participant
Using maps to define how to capture, detect and prevent 6 real-world security incidents Hands on session on how to use Wardley maps working-session Tue AM-1 participant
AWS Lambda Security How to secure Lambda functions product-session Wed PM-1 participant
Threat model guide Threat model guide with levels working-session Thu PM-1 participant
How to scale Threat Modeling. How to scale Threat Modeling working-session Thu PM-2 participant
Securing AWS S3 Buckets product-session Wed PM-2 participant
Owasp Testing Guide v5 Working Sessions for Owasp Testing Guide v5 working-session Thu PM-2,PM-3 participant
How to Threat Model Features with Questionnaires How to Threat Model Features with Questionnaires working-session Wed PM-2 participant
Security Crowdsourcing Working Sessions for Security Crowdsourcing working-session Tue PM-3 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Aurelijus Stanislovaitis)


Back to list of all Participants