Fraser Scott

Cyber Threat Modeling Engineer, Capital One

Ex Cloud SecOps/DevOps/SysAdmin. Threat Modeling fanboi. Lover of FOSS. Interested in security automation, Agile security, Rugged DevOps/DevSecOps/SecDevOps, security at scale, and lots of other things.

Participant's team(s):

Fraser Scott Daily Schedule

MondayTuesdayWednesdayThursdayFriday
AM-1
10:30 - 12:30
Time slot over-subscribed
Describe different ways of implementing TM in agile organisations
Kings room
Using JIRA-NeoVis to graph Threat Models
Time slot over-subscribed
Azure Security Features, Just a Few
Pedley room
IoT Threat Modeling Cheat Sheet
Kings room
Wardley Mapping – a practical session on how to use value chain mapping
Larch room
Time slot over-subscribed
Create generic TM for CMS
Kings room
Using JIRA-NeoVis to create graphical representations of JIRA data
Larch room
PM-1
13:30 - 15:00
Threat model track opening session
Kings room
Time slot over-subscribed
Using User Story Mapping for effective communication
Larch room
Docker and Kubernetes Threat Modeling Cheat Sheet
Kings room
Time slot over-subscribed
Threat model guide
Kings room
Cell based Structures for Security
Larch room
Share your Threat Models diagrams and create a Book
Kings room
PM-2
15:30 - 16:30
Owasp Cloud Security Workshop (BETA)
Maulden room
How to Threat Model Features with Questionnaires
Kings room
PM-3
16:30 - 17:30
Time slot over-subscribed
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Integrating Security into an Spotify Model (and using Squads for Security teams)
Maulden room
Threat Model training through Gamification
Kings room
Threat model closing session
Kings room

Participating sessions details

TitleDescriptiontypeWhenTimeActing as
Threat model track opening sessionThreat Modeling track openingworking-sessionMonPM-1participant
Describe different ways of implementing TM in agile organisationsworking-sessionWedAM-1participant
Docker and Kubernetes Threat Modeling Cheat SheetDocker and Kubernetes Threat Modeling Cheat Sheetworking-sessionWedPM-1participant
How to Threat Model Features with QuestionnairesHow to Threat Model Features with Questionnairesworking-sessionWedPM-2participant
Federated Login with Social Platforms Threat Modeling Cheat SheetFederated Login with Social Platforms Threat Modeling Cheat Sheetworking-sessionWedPM-3participant
IoT Threat Modeling Cheat SheetIoT Threat Modeling Cheat Sheetworking-sessionThuAM-1participant
Threat model guideThreat model guide with levelsworking-sessionThuPM-1participant
How to scale Threat Modeling
Threat Model training through GamificationThreat Model training through Gamificationworking-sessionThuPM-3participant
Create generic TM for CMSworking-sessionFriAM-1participant
Share your Threat Models diagrams and create a Bookworking-sessionFriPM-1participant
Threat model closing sessionThreat Modeling Working Sessionworking-sessionFriPM-3participant
Integrating Security into an Spotify Model (and using Squads for Security teams)Best practice cheat sheet for integrating Agile Security into the Spotify modelworking-sessionWedPM-3participant
Using JIRA-NeoVis to graph Threat ModelsPractical session on using the JIRA-NeoVis toolworking-sessionWedAM-1participant
Using JIRA-NeoVis to create graphical representations of JIRA dataPractical session on using the JIRA-NeoVis toolworking-sessionFriAM-1participant
Cell based Structures for SecuritySpotify compliant organizational model in security domainworking-sessionThuPM-1participant
Wardley Mapping – a practical session on how to use value chain mappingPractical session on how to use value chain mapping.user-sessionThuAM-1participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Fraser Scott)


Back to list of all Participants