Cyber Threat Modeling Engineer, Capital One
Ex Cloud SecOps/DevOps/SysAdmin. Threat Modeling fanboi. Lover of FOSS. Interested in security automation, Agile security, Rugged DevOps/DevSecOps/SecDevOps, security at scale, and lots of other things.
Fraser Scott Daily Schedule
| Monday | Tuesday | Wednesday | Thursday | Friday | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
| ||||||||||||||
|
|
|
|
| |||||||||||||
|
|
| |||||||||||||||
|
|
|
|
Participating sessions details
| Title | Description | type | When | Time | Acting as |
|---|---|---|---|---|---|
| Threat model track opening session | Threat Modeling track opening | working-session | Mon | PM-1 | participant |
| Describe different ways of implementing TM in agile organisations | working-session | Wed | AM-1 | participant | |
| Docker and Kubernetes Threat Modeling Cheat Sheet | Docker and Kubernetes Threat Modeling Cheat Sheet | working-session | Wed | PM-1 | participant |
| How to Threat Model Features with Questionnaires | How to Threat Model Features with Questionnaires | working-session | Wed | PM-2 | participant |
| Federated Login with Social Platforms Threat Modeling Cheat Sheet | Federated Login with Social Platforms Threat Modeling Cheat Sheet | working-session | Wed | PM-3 | participant |
| IoT Threat Modeling Cheat Sheet | IoT Threat Modeling Cheat Sheet | working-session | Thu | AM-1 | participant |
| Threat model guide | Threat model guide with levels | working-session | Thu | PM-1 | participant |
| How to scale Threat Modeling | |||||
| Threat Model training through Gamification | Threat Model training through Gamification | working-session | Thu | PM-3 | participant |
| Create generic TM for CMS | working-session | Fri | AM-1 | participant | |
| Share your Threat Models diagrams and create a Book | working-session | Fri | PM-1 | participant | |
| Threat model closing session | Threat Modeling Working Session | working-session | Fri | PM-3 | participant |
| Integrating Security into an Spotify Model (and using Squads for Security teams) | Best practice cheat sheet for integrating Agile Security into the Spotify model | working-session | Wed | PM-3 | participant |
| Using JIRA-NeoVis to graph Threat Models | Practical session on using the JIRA-NeoVis tool | working-session | Wed | AM-1 | participant |
| Using JIRA-NeoVis to create graphical representations of JIRA data | Practical session on using the JIRA-NeoVis tool | working-session | Fri | AM-1 | participant |
| Cell based Structures for Security | Spotify compliant organizational model in security domain | working-session | Thu | PM-1 | participant |
| Wardley Mapping – a practical session on how to use value chain mapping | Practical session on how to use value chain mapping. | user-session | Thu | AM-1 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizersmetadata field (in this caseFraser Scott)
Back to list of all Participants
