Tash Norris

Cyber Threat Modeling Engineer, Capital One

Participant's team(s):

Tash Norris Daily Schedule

MondayTuesdayWednesdayThursdayFriday
AM-1
10:30 - 12:30
Threat model cheat sheets
Kings room
Describe different ways of implementing TM in agile organisations
Kings room
IoT Threat Modeling Cheat Sheet
Kings room
Create generic TM for CMS
Kings room
PM-1
13:30 - 15:00
Threat model track opening session
Kings room
API Threat Modeling Cheat Sheet
Kings room
Using User Story Mapping for effective communication
Larch room
Threat model guide
Kings room
Share your Threat Models diagrams and create a Book
Kings room
PM-2
15:30 - 16:30
Time slot over-subscribed
Threat Modeling Website Structure
Kings room
Owasp Cloud Security Workshop (BETA)
Maulden room
Attack chains as TM technique
Kings room
How to Threat Model Features with Questionnaires
Kings room
How to scale Threat Modeling.
Kings room
PM-3
16:30 - 17:30
Back to the future with Threat Modeling
Kings room
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Threat Model training through Gamification
Kings room
Eve-1
19:30 - 21:00
Using a Rules Engine and Risk Patterns with IriusRisk
320 - Threat Modeling villa
Eve-2
21:00 - 23:00
Using Threat Models for GDPR
317 - Photobox villa

Participating sessions details

TitleDescriptiontypeWhenTimeActing as
Threat model track opening sessionThreat Modeling track openingworking-sessionMonPM-1participant
Threat Modeling Website Structureworking-sessionMonPM-2participant
Using a Rules Engine and Risk Patterns with IriusRiskDuring this session we’ll drive the attendants through the IriusRisk approach and the main core features of the solution.product-sessionMonEve-1participant
Describe different ways of implementing TM in agile organisationsworking-sessionWedAM-1participant
API Threat Modeling Cheat SheetAPI Threat Modeling Cheat Sheetworking-sessionTuePM-1participant
Attack chains as TM techniqueThreat Modeling Working Sessionworking-sessionTuePM-2participant
Back to the future with Threat ModelingBack to the future with Threat Modelingworking-sessionTuePM-3participant
Threat model cheat sheetsThreat Modeling Working Sessionworking-sessionTueAM-1participant
How to Threat Model Features with QuestionnairesHow to Threat Model Features with Questionnairesworking-sessionWedPM-2participant
Using Threat Models for GDPRHands on user session on how to use Threat Models in GDPR mappingsuser-sessionTueEve-2participant
Federated Login with Social Platforms Threat Modeling Cheat SheetFederated Login with Social Platforms Threat Modeling Cheat Sheetworking-sessionWedPM-3participant
IoT Threat Modeling Cheat SheetIoT Threat Modeling Cheat Sheetworking-sessionThuAM-1participant
Threat model guideThreat model guide with levelsworking-sessionThuPM-1participant
How to scale Threat Modeling.How to scale Threat Modelingworking-sessionThuPM-2participant
Threat Model training through GamificationThreat Model training through Gamificationworking-sessionThuPM-3participant
Getting more women in Cyber-security
Create generic TM for CMSworking-sessionFriAM-1participant
Using User Story Mapping for effective communicationworking-sessionWedPM-1participant
Share your Threat Models diagrams and create a Bookworking-sessionFriPM-1participant
Owasp Cloud Security Workshop (BETA)A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday)working-sessionMonPM-2,PM-3participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Tash Norris)


Back to list of all Participants