Avi Douglen

Software security consultant, Bounce Security

Avi D is a software security consultant, focusing on efficient upstream activities to help development teams and technology companies build secure systems.

Sponsored By:

Participant's team(s):

Avi Douglen Daily Schedule

Subscribed to track Threat Model which has 29 sessions
Monday Tuesday Wednesday Thursday Friday
KN-2
9:40 - 9:55
Crossing the river by feeling the stones
main-stage
Adding Privacy by Design in Secure Application Development
main-stage
AM-1
10:30 - 12:30
Threat model cheat sheets
Kings room
Time slot over-subscribed
Describe different ways of implementing TM in agile organisations
Kings room
OWASP DevSecOps Studio
Maulden room
Time slot over-subscribed
IoT Threat Modeling Cheat Sheet
Kings room
Integrating Security Tools in the SDL
Maulden room
Wardley Mapping – a practical session on how to use value chain mapping
Larch room
Create generic TM for CMS
Kings room
DS-2
12:30 - 13:30
A seat at the table
main-stage
PM-1
13:30 - 15:00
Time slot over-subscribed
Threat model track opening session
Kings room
Integrating Security Tools in the SDL using OWASP DevSecOps Studio
Maulden room
API Threat Modeling Cheat Sheet
Kings room
Time slot over-subscribed
Docker and Kubernetes Threat Modeling Cheat Sheet
Kings room
Creating Appsec metrics and visualisation
Maulden room
Time slot over-subscribed
Threat model guide
Kings room
Share your Threat Models diagrams and create a Book
Kings room
PM-2
15:30 - 16:30
Threat Modeling Website Structure
Kings room
Attack chains as TM technique
Kings room
How to Threat Model Features with Questionnaires
Kings room
How to scale Threat Modeling.
Kings room
PM-3
16:30 - 17:30
Update Treat Modeling website 1
Kings room
Back to the future with Threat Modeling
Kings room
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Threat Model training through Gamification
Kings room
Threat model closing session
Kings room
Eve-1
19:30 - 21:00
Using a Rules Engine and Risk Patterns with IriusRisk
320 - Threat Modeling villa
Update Treat Modeling website 3
320 - Threat Modeling villa
Update Treat Modeling website 4
320 - Threat Modeling villa
Update Treat Modeling website 5
320 - Threat Modeling villa
Eve-2
21:00 - 23:00
Update Treat Modeling website 2
320 - Threat Modeling villa
Using Threat Models for GDPR
317 - Photobox villa
Writing Checkmarx SAST rules
313 - DevSecCon villa

Participating sessions details

Title Description type When Time Acting as
Integrating Security Tools in the SDL Integrate security tools as part of CI/CD pipeline to find/fix issues early in SDL working-session Thu AM-1, PM-1 participant
Using Threat Models for GDPR Hands on user session on how to use Threat Models in GDPR mappings user-session Tue Eve-2 participant
Integrating Security Tools in the SDL using OWASP DevSecOps Studio Using DevSecOps studio to learn and teach Integrating security tools in the SDL user-session Mon PM-1 participant
OwaspSAMM - Best Practices
Wardley Mapping – a practical session on how to use value chain mapping Practical session on how to use value chain mapping. user-session Thu AM-1 participant
Getting more women in Cyber-security
Recruiting Appsec Talent
Agile practices for security teams
OWASP DevSecOps Studio Working Sessions for Owasp DevSecOps Studio working-session Wed AM-1 participant
Creating Appsec metrics and visualisation AppSec Metrics and Visualisation user-session Wed PM-1 participant
A seat at the table Keynote by Adam user-session Mon DS-2 participant
Adding Privacy by Design in Secure Application Development Keynote by Sebastien Deleersnyder user-session Fri KN-2 participant
Crossing the river by feeling the stones Keynote by Simon Wardley user-session Thu KN-2 participant
participant-remote participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Avi Douglen)


Back to list of all Participants