Aurelijus Stanislovaitis

sectest consultant, Visma

Participant's team(s):

    Aurelijus Stanislovaitis Daily Schedule

    MondayTuesdayWednesdayThursdayFriday
    KN-2
    9:40 - 9:55
    Gamifying Security Dashboards
    main-stage
    Thinking in Graphs
    main-stage
    AM-1
    10:30 - 12:30
    Time slot over-subscribed
    Threat model cheat sheets
    Kings room
    Using maps to define how to capture, detect and prevent 6 real-world security incidents
    Larch room
    Application Security Verification Standard
    314 - Owasp Projects villa
    Azure Security Features, Just a Few
    Pedley room
    PM-1
    13:30 - 15:00
    Threat model track opening session
    Kings room
    Time slot over-subscribed
    API Threat Modeling Cheat Sheet
    Kings room
    Update MSTG with changes in Android 8 (Oreo)
    314 - Owasp Projects villa
    Time slot over-subscribed
    Docker and Kubernetes Threat Modeling Cheat Sheet
    Kings room
    AWS Lambda Security
    Portland room
    Threat model guide
    Kings room
    PM-2
    15:30 - 16:30
    Create Wardley Maps for multiple security scenarios
    Larch room
    Time slot over-subscribed
    Attack chains as TM technique
    Kings room
    Time slot over-subscribed
    How to Threat Model Features with Questionnaires
    Kings room
    Update MSTG with changes in iOS 11
    314 - Owasp Projects villa
    Securing AWS S3 Buckets
    Portland room
    Time slot over-subscribed
    How to scale Threat Modeling.
    Kings room
    Owasp Testing Guide v5
    314 - Owasp Projects villa
    PM-3
    16:30 - 17:30
    Update Treat Modeling website 1
    Kings room
    Time slot over-subscribed
    Back to the future with Threat Modeling
    Kings room
    Security Crowdsourcing
    313 - DevSecCon villa
    Federated Login with Social Platforms Threat Modeling Cheat Sheet
    Kings room

    Participating sessions details

    TitleDescriptiontypeWhenTimeActing as
    Threat model track opening sessionThreat Modeling track openingworking-sessionMonPM-1participant
    Create Wardley Maps for multiple security scenariosPractical session on creating [Wardley Maps]working-sessionMonPM-2participant
    Update Treat Modeling website 1user-sessionMonPM-3participant
    Threat model cheat sheetsThreat Modeling Working Sessionworking-sessionTueAM-1participant
    API Threat Modeling Cheat SheetAPI Threat Modeling Cheat Sheetworking-sessionTuePM-1participant
    Attack chains as TM techniqueThreat Modeling Working Sessionworking-sessionTuePM-2participant
    Back to the future with Threat ModelingBack to the future with Threat Modelingworking-sessionTuePM-3participant
    Update MSTG with changes in Android 8 (Oreo)Mobile Security Working Sessionworking-sessionTuePM-1, PM-2participant
    Docker and Kubernetes Threat Modeling Cheat SheetDocker and Kubernetes Threat Modeling Cheat Sheetworking-sessionWedPM-1participant
    How to Threat Model Features with QuestionnairesHow to Threat Model Features with Questionnairesworking-sessionWedPM-2participant
    Federated Login with Social Platforms Threat Modeling Cheat SheetFederated Login with Social Platforms Threat Modeling Cheat Sheetworking-sessionWedPM-3participant
    Thinking in GraphsKeynote by Dinis Cruzuser-sessionWedKN-2participant
    Gamifying Security DashboardsKeynote by Ante Gulamuser-sessionTueKN-2participant
    Update MSTG with changes in iOS 11Mobile Security Working Sessionworking-sessionWedPM-2participant
    Update MSTG with changes in Android 8 (Oreo)Mobile Security Working Sessionworking-sessionTuePM-1, PM-2participant
    Application Security Verification StandardSession on ASVSworking-sessionWedAM-1participant
    Using maps to define how to capture, detect and prevent 6 real-world security incidentsHands on session on how to use Wardley mapsworking-sessionTueAM-1participant
    AWS Lambda SecurityHow to secure Lambda functionsproduct-sessionWedPM-1participant
    Threat model guideThreat model guide with levelsworking-sessionThuPM-1participant
    How to scale Threat Modeling.How to scale Threat Modelingworking-sessionThuPM-2participant
    Securing AWS S3 Bucketsproduct-sessionWedPM-2participant
    Owasp Testing Guide v5Working Sessions for Owasp Testing Guide v5working-sessionThuPM-2,PM-3participant
    How to Threat Model Features with QuestionnairesHow to Threat Model Features with Questionnairesworking-sessionWedPM-2participant
    Security CrowdsourcingWorking Sessions for Security Crowdsourcingworking-sessionTuePM-3participant

    Register as organizer

    To register as an organizer of an session or track:

    • add your name to the organizers metadata field (in this case Aurelijus Stanislovaitis)


    Back to list of all Participants