Fraser Scott

Cyber Threat Modeling Engineer, Capital One

Ex Cloud SecOps/DevOps/SysAdmin. Threat Modeling fanboi. Lover of FOSS. Interested in security automation, Agile security, Rugged DevOps/DevSecOps/SecDevOps, security at scale, and lots of other things.

Participant's team(s):

Fraser Scott Daily Schedule

Monday Tuesday Wednesday Thursday Friday
AM-1
10:30 - 12:30
Time slot over-subscribed
Describe different ways of implementing TM in agile organisations
Kings room
Using JIRA-NeoVis to graph Threat Models
Time slot over-subscribed
Azure Security Features, Just a Few
Pedley room
IoT Threat Modeling Cheat Sheet
Kings room
Wardley Mapping – a practical session on how to use value chain mapping
Larch room
Time slot over-subscribed
Create generic TM for CMS
Kings room
Using JIRA-NeoVis to create graphical representations of JIRA data
Larch room
PM-1
13:30 - 15:00
Threat model track opening session
Kings room
Time slot over-subscribed
Using User Story Mapping for effective communication
Larch room
Docker and Kubernetes Threat Modeling Cheat Sheet
Kings room
Time slot over-subscribed
Threat model guide
Kings room
Cell based Structures for Security
Larch room
Share your Threat Models diagrams and create a Book
Kings room
PM-2
15:30 - 16:30
Owasp Cloud Security Workshop (BETA)
Maulden room
How to Threat Model Features with Questionnaires
Kings room
PM-3
16:30 - 17:30
Time slot over-subscribed
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Integrating Security into an Spotify Model (and using Squads for Security teams)
Maulden room
Threat Model training through Gamification
Kings room
Threat model closing session
Kings room

Participating sessions details

Title Description type When Time Acting as
Threat model track opening session Threat Modeling track opening working-session Mon PM-1 participant
Describe different ways of implementing TM in agile organisations working-session Wed AM-1 participant
Docker and Kubernetes Threat Modeling Cheat Sheet Docker and Kubernetes Threat Modeling Cheat Sheet working-session Wed PM-1 participant
How to Threat Model Features with Questionnaires How to Threat Model Features with Questionnaires working-session Wed PM-2 participant
Federated Login with Social Platforms Threat Modeling Cheat Sheet Federated Login with Social Platforms Threat Modeling Cheat Sheet working-session Wed PM-3 participant
IoT Threat Modeling Cheat Sheet IoT Threat Modeling Cheat Sheet working-session Thu AM-1 participant
Threat model guide Threat model guide with levels working-session Thu PM-1 participant
How to scale Threat Modeling
Threat Model training through Gamification Threat Model training through Gamification working-session Thu PM-3 participant
Create generic TM for CMS working-session Fri AM-1 participant
Share your Threat Models diagrams and create a Book working-session Fri PM-1 participant
Threat model closing session Threat Modeling Working Session working-session Fri PM-3 participant
Integrating Security into an Spotify Model (and using Squads for Security teams) Best practice cheat sheet for integrating Agile Security into the Spotify model working-session Wed PM-3 participant
Using JIRA-NeoVis to graph Threat Models Practical session on using the JIRA-NeoVis tool working-session Wed AM-1 participant
Using JIRA-NeoVis to create graphical representations of JIRA data Practical session on using the JIRA-NeoVis tool working-session Fri AM-1 participant
Cell based Structures for Security Spotify compliant organizational model in security domain working-session Thu PM-1 participant
Wardley Mapping – a practical session on how to use value chain mapping Practical session on how to use value chain mapping. user-session Thu AM-1 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Fraser Scott)


Back to list of all Participants