Cyber Threat Modeling Engineer, Capital One
Tash Norris Daily Schedule
Monday | Tuesday | Wednesday | Thursday | Friday | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
|
| |||||||||
|
|
|
|
|
| ||||||||
|
|
|
|
| |||||||||
|
|
|
| ||||||||||
|
| ||||||||||||
|
|
Participating sessions details
Title | Description | type | When | Time | Acting as |
---|---|---|---|---|---|
Threat model track opening session | Threat Modeling track opening | working-session | Mon | PM-1 | participant |
Threat Modeling Website Structure | working-session | Mon | PM-2 | participant | |
Using a Rules Engine and Risk Patterns with IriusRisk | During this session we’ll drive the attendants through the IriusRisk approach and the main core features of the solution. | product-session | Mon | Eve-1 | participant |
Describe different ways of implementing TM in agile organisations | working-session | Wed | AM-1 | participant | |
API Threat Modeling Cheat Sheet | API Threat Modeling Cheat Sheet | working-session | Tue | PM-1 | participant |
Attack chains as TM technique | Threat Modeling Working Session | working-session | Tue | PM-2 | participant |
Back to the future with Threat Modeling | Back to the future with Threat Modeling | working-session | Tue | PM-3 | participant |
Threat model cheat sheets | Threat Modeling Working Session | working-session | Tue | AM-1 | participant |
How to Threat Model Features with Questionnaires | How to Threat Model Features with Questionnaires | working-session | Wed | PM-2 | participant |
Using Threat Models for GDPR | Hands on user session on how to use Threat Models in GDPR mappings | user-session | Tue | Eve-2 | participant |
Federated Login with Social Platforms Threat Modeling Cheat Sheet | Federated Login with Social Platforms Threat Modeling Cheat Sheet | working-session | Wed | PM-3 | participant |
IoT Threat Modeling Cheat Sheet | IoT Threat Modeling Cheat Sheet | working-session | Thu | AM-1 | participant |
Threat model guide | Threat model guide with levels | working-session | Thu | PM-1 | participant |
How to scale Threat Modeling. | How to scale Threat Modeling | working-session | Thu | PM-2 | participant |
Threat Model training through Gamification | Threat Model training through Gamification | working-session | Thu | PM-3 | participant |
Getting more women in Cyber-security | |||||
Create generic TM for CMS | working-session | Fri | AM-1 | participant | |
Using User Story Mapping for effective communication | working-session | Wed | PM-1 | participant | |
Share your Threat Models diagrams and create a Book | working-session | Fri | PM-1 | participant | |
Owasp Cloud Security Workshop (BETA) | A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday) | working-session | Mon | PM-2,PM-3 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizers
metadata field (in this caseTash Norris
)
Back to list of all Participants