Avi Douglen

Software security consultant, Bounce Security

Avi D is a software security consultant, focusing on efficient upstream activities to help development teams and technology companies build secure systems.

Sponsored By:

Participant's team(s):

Avi Douglen Daily Schedule

Subscribed to track Threat Model which has 29 sessions
MondayTuesdayWednesdayThursdayFriday
KN-2
9:40 - 9:55
Crossing the river by feeling the stones
main-stage
Adding Privacy by Design in Secure Application Development
main-stage
AM-1
10:30 - 12:30
Threat model cheat sheets
Kings room
Time slot over-subscribed
Describe different ways of implementing TM in agile organisations
Kings room
OWASP DevSecOps Studio
Maulden room
Time slot over-subscribed
IoT Threat Modeling Cheat Sheet
Kings room
Integrating Security Tools in the SDL
Maulden room
Wardley Mapping – a practical session on how to use value chain mapping
Larch room
Create generic TM for CMS
Kings room
DS-2
12:30 - 13:30
A seat at the table
main-stage
PM-1
13:30 - 15:00
Time slot over-subscribed
Threat model track opening session
Kings room
Integrating Security Tools in the SDL using OWASP DevSecOps Studio
Maulden room
API Threat Modeling Cheat Sheet
Kings room
Time slot over-subscribed
Docker and Kubernetes Threat Modeling Cheat Sheet
Kings room
Creating Appsec metrics and visualisation
Maulden room
Time slot over-subscribed
Threat model guide
Kings room
Share your Threat Models diagrams and create a Book
Kings room
PM-2
15:30 - 16:30
Threat Modeling Website Structure
Kings room
Attack chains as TM technique
Kings room
How to Threat Model Features with Questionnaires
Kings room
How to scale Threat Modeling.
Kings room
PM-3
16:30 - 17:30
Update Treat Modeling website 1
Kings room
Back to the future with Threat Modeling
Kings room
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Threat Model training through Gamification
Kings room
Threat model closing session
Kings room
Eve-1
19:30 - 21:00
Using a Rules Engine and Risk Patterns with IriusRisk
320 - Threat Modeling villa
Update Treat Modeling website 3
320 - Threat Modeling villa
Update Treat Modeling website 4
320 - Threat Modeling villa
Update Treat Modeling website 5
320 - Threat Modeling villa
Eve-2
21:00 - 23:00
Update Treat Modeling website 2
320 - Threat Modeling villa
Using Threat Models for GDPR
317 - Photobox villa
Writing Checkmarx SAST rules
313 - DevSecCon villa

Participating sessions details

TitleDescriptiontypeWhenTimeActing as
Integrating Security Tools in the SDLIntegrate security tools as part of CI/CD pipeline to find/fix issues early in SDLworking-sessionThuAM-1, PM-1participant
Using Threat Models for GDPRHands on user session on how to use Threat Models in GDPR mappingsuser-sessionTueEve-2participant
Integrating Security Tools in the SDL using OWASP DevSecOps StudioUsing DevSecOps studio to learn and teach Integrating security tools in the SDLuser-sessionMonPM-1participant
OwaspSAMM - Best Practices
Wardley Mapping – a practical session on how to use value chain mappingPractical session on how to use value chain mapping.user-sessionThuAM-1participant
Getting more women in Cyber-security
Recruiting Appsec Talent
Agile practices for security teams
OWASP DevSecOps StudioWorking Sessions for Owasp DevSecOps Studioworking-sessionWedAM-1participant
Creating Appsec metrics and visualisationAppSec Metrics and Visualisationuser-sessionWedPM-1participant
A seat at the tableKeynote by Adamuser-sessionMonDS-2participant
Adding Privacy by Design in Secure Application DevelopmentKeynote by Sebastien Deleersnyderuser-sessionFriKN-2participant
Crossing the river by feeling the stonesKeynote by Simon Wardleyuser-sessionThuKN-2participant
participant-remoteparticipant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Avi Douglen)


Back to list of all Participants