Stuart Winter-Tear

Security Analyst, Continuum Security

Participant's team(s):

Stuart Winter-Tear Daily Schedule

Monday Tuesday Wednesday Thursday Friday
AM-1
10:30 - 12:30
Threat model cheat sheets
Kings room
Describe different ways of implementing TM in agile organisations
Kings room
IoT Threat Modeling Cheat Sheet
Kings room
PM-1
13:30 - 15:00
API Threat Modeling Cheat Sheet
Kings room
Using User Story Mapping for effective communication
Larch room
Threat model guide
Kings room
PM-2
15:30 - 16:30
Attack chains as TM technique
Kings room
How to Threat Model Features with Questionnaires
Kings room
How to scale Threat Modeling.
Kings room
PM-3
16:30 - 17:30
Back to the future with Threat Modeling
Kings room
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Threat Model training through Gamification
Kings room

Participating sessions details

Title Description type When Time Acting as
Threat model cheat sheets Threat Modeling Working Session working-session Tue AM-1 participant
API Threat Modeling Cheat Sheet API Threat Modeling Cheat Sheet working-session Tue PM-1 participant
Attack chains as TM technique Threat Modeling Working Session working-session Tue PM-2 participant
Back to the future with Threat Modeling Back to the future with Threat Modeling working-session Tue PM-3 participant
Describe different ways of implementing TM in agile organisations working-session Wed AM-1 participant
Using User Story Mapping for effective communication working-session Wed PM-1 participant
How to Threat Model Features with Questionnaires How to Threat Model Features with Questionnaires working-session Wed PM-2 participant
Federated Login with Social Platforms Threat Modeling Cheat Sheet Federated Login with Social Platforms Threat Modeling Cheat Sheet working-session Wed PM-3 participant
IoT Threat Modeling Cheat Sheet IoT Threat Modeling Cheat Sheet working-session Thu AM-1 participant
Threat model guide Threat model guide with levels working-session Thu PM-1 participant
How to scale Threat Modeling. How to scale Threat Modeling working-session Thu PM-2 participant
Threat Model training through Gamification Threat Model training through Gamification working-session Thu PM-3 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Stuart Winter-Tear)


Back to list of all Participants