Security Analyst, Continuum Security

Stuart Winter-Tear Daily Schedule
| Monday | Tuesday | Wednesday | Thursday | Friday | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
| |||||||
|
|
|
| |||||||
|
|
|
| |||||||
|
|
|
|
Participating sessions details
| Title | Description | type | When | Time | Acting as |
|---|---|---|---|---|---|
| Threat model cheat sheets | Threat Modeling Working Session | working-session | Tue | AM-1 | participant |
| API Threat Modeling Cheat Sheet | API Threat Modeling Cheat Sheet | working-session | Tue | PM-1 | participant |
| Attack chains as TM technique | Threat Modeling Working Session | working-session | Tue | PM-2 | participant |
| Back to the future with Threat Modeling | Back to the future with Threat Modeling | working-session | Tue | PM-3 | participant |
| Describe different ways of implementing TM in agile organisations | working-session | Wed | AM-1 | participant | |
| Using User Story Mapping for effective communication | working-session | Wed | PM-1 | participant | |
| How to Threat Model Features with Questionnaires | How to Threat Model Features with Questionnaires | working-session | Wed | PM-2 | participant |
| Federated Login with Social Platforms Threat Modeling Cheat Sheet | Federated Login with Social Platforms Threat Modeling Cheat Sheet | working-session | Wed | PM-3 | participant |
| IoT Threat Modeling Cheat Sheet | IoT Threat Modeling Cheat Sheet | working-session | Thu | AM-1 | participant |
| Threat model guide | Threat model guide with levels | working-session | Thu | PM-1 | participant |
| How to scale Threat Modeling. | How to scale Threat Modeling | working-session | Thu | PM-2 | participant |
| Threat Model training through Gamification | Threat Model training through Gamification | working-session | Thu | PM-3 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizersmetadata field (in this caseStuart Winter-Tear)
Back to list of all Participants
