Tash Norris

Cyber Threat Modeling Engineer, Capital One

Participant's team(s):

Tash Norris Daily Schedule

Monday Tuesday Wednesday Thursday Friday
AM-1
10:30 - 12:30
Threat model cheat sheets
Kings room
Describe different ways of implementing TM in agile organisations
Kings room
IoT Threat Modeling Cheat Sheet
Kings room
Create generic TM for CMS
Kings room
PM-1
13:30 - 15:00
Threat model track opening session
Kings room
API Threat Modeling Cheat Sheet
Kings room
Using User Story Mapping for effective communication
Larch room
Threat model guide
Kings room
Share your Threat Models diagrams and create a Book
Kings room
PM-2
15:30 - 16:30
Time slot over-subscribed
Threat Modeling Website Structure
Kings room
Owasp Cloud Security Workshop (BETA)
Maulden room
Attack chains as TM technique
Kings room
How to Threat Model Features with Questionnaires
Kings room
How to scale Threat Modeling.
Kings room
PM-3
16:30 - 17:30
Back to the future with Threat Modeling
Kings room
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Threat Model training through Gamification
Kings room
Eve-1
19:30 - 21:00
Using a Rules Engine and Risk Patterns with IriusRisk
320 - Threat Modeling villa
Eve-2
21:00 - 23:00
Using Threat Models for GDPR
317 - Photobox villa

Participating sessions details

Title Description type When Time Acting as
Threat model track opening session Threat Modeling track opening working-session Mon PM-1 participant
Threat Modeling Website Structure working-session Mon PM-2 participant
Using a Rules Engine and Risk Patterns with IriusRisk During this session we’ll drive the attendants through the IriusRisk approach and the main core features of the solution. product-session Mon Eve-1 participant
Describe different ways of implementing TM in agile organisations working-session Wed AM-1 participant
API Threat Modeling Cheat Sheet API Threat Modeling Cheat Sheet working-session Tue PM-1 participant
Attack chains as TM technique Threat Modeling Working Session working-session Tue PM-2 participant
Back to the future with Threat Modeling Back to the future with Threat Modeling working-session Tue PM-3 participant
Threat model cheat sheets Threat Modeling Working Session working-session Tue AM-1 participant
How to Threat Model Features with Questionnaires How to Threat Model Features with Questionnaires working-session Wed PM-2 participant
Using Threat Models for GDPR Hands on user session on how to use Threat Models in GDPR mappings user-session Tue Eve-2 participant
Federated Login with Social Platforms Threat Modeling Cheat Sheet Federated Login with Social Platforms Threat Modeling Cheat Sheet working-session Wed PM-3 participant
IoT Threat Modeling Cheat Sheet IoT Threat Modeling Cheat Sheet working-session Thu AM-1 participant
Threat model guide Threat model guide with levels working-session Thu PM-1 participant
How to scale Threat Modeling. How to scale Threat Modeling working-session Thu PM-2 participant
Threat Model training through Gamification Threat Model training through Gamification working-session Thu PM-3 participant
Getting more women in Cyber-security
Create generic TM for CMS working-session Fri AM-1 participant
Using User Story Mapping for effective communication working-session Wed PM-1 participant
Share your Threat Models diagrams and create a Book working-session Fri PM-1 participant
Owasp Cloud Security Workshop (BETA) A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday) working-session Mon PM-2,PM-3 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Tash Norris)


Back to list of all Participants