Cyber Threat Modeling Engineer, Capital One
Ex Cloud SecOps/DevOps/SysAdmin. Threat Modeling fanboi. Lover of FOSS. Interested in security automation, Agile security, Rugged DevOps/DevSecOps/SecDevOps, security at scale, and lots of other things.
Fraser Scott Daily Schedule
Monday | Tuesday | Wednesday | Thursday | Friday | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
| ||||||||||||||
|
|
|
|
| |||||||||||||
|
|
| |||||||||||||||
|
|
|
|
Participating sessions details
Title | Description | type | When | Time | Acting as |
---|---|---|---|---|---|
Threat model track opening session | Threat Modeling track opening | working-session | Mon | PM-1 | participant |
Describe different ways of implementing TM in agile organisations | working-session | Wed | AM-1 | participant | |
Docker and Kubernetes Threat Modeling Cheat Sheet | Docker and Kubernetes Threat Modeling Cheat Sheet | working-session | Wed | PM-1 | participant |
How to Threat Model Features with Questionnaires | How to Threat Model Features with Questionnaires | working-session | Wed | PM-2 | participant |
Federated Login with Social Platforms Threat Modeling Cheat Sheet | Federated Login with Social Platforms Threat Modeling Cheat Sheet | working-session | Wed | PM-3 | participant |
IoT Threat Modeling Cheat Sheet | IoT Threat Modeling Cheat Sheet | working-session | Thu | AM-1 | participant |
Threat model guide | Threat model guide with levels | working-session | Thu | PM-1 | participant |
How to scale Threat Modeling | |||||
Threat Model training through Gamification | Threat Model training through Gamification | working-session | Thu | PM-3 | participant |
Create generic TM for CMS | working-session | Fri | AM-1 | participant | |
Share your Threat Models diagrams and create a Book | working-session | Fri | PM-1 | participant | |
Threat model closing session | Threat Modeling Working Session | working-session | Fri | PM-3 | participant |
Integrating Security into an Spotify Model (and using Squads for Security teams) | Best practice cheat sheet for integrating Agile Security into the Spotify model | working-session | Wed | PM-3 | participant |
Using JIRA-NeoVis to graph Threat Models | Practical session on using the JIRA-NeoVis tool | working-session | Wed | AM-1 | participant |
Using JIRA-NeoVis to create graphical representations of JIRA data | Practical session on using the JIRA-NeoVis tool | working-session | Fri | AM-1 | participant |
Cell based Structures for Security | Spotify compliant organizational model in security domain | working-session | Thu | PM-1 | participant |
Wardley Mapping – a practical session on how to use value chain mapping | Practical session on how to use value chain mapping. | user-session | Thu | AM-1 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizers
metadata field (in this caseFraser Scott
)
Back to list of all Participants