IT Engineer, Centerprise International
Sponsored By:
Sara Davis Daily Schedule
| Monday | Tuesday | Wednesday | Thursday | Friday | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
| ||||||||||
|
|
|
|
| |||||||||
|
|
| |||||||||||
|
|
|
|
| |||||||||
|
|
|
| ||||||||||
|
|
|
| ||||||||||
|
| ||||||||||||
|
Participating sessions details
| Title | Description | type | When | Time | Acting as |
|---|---|---|---|---|---|
| Track Introductions | user-session | Mon | AM-1 | participant | |
| Creating a Steady-State Hypothesis | Exploring the Chaos Toolkit's stead-state hypothesis and how one can be designed and constructed for DevSecOps concerns. | working-session | Mon | PM-1 | participant |
| Owasp Cloud Security Workshop (BETA) | A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday) | working-session | Mon | PM-2,PM-3 | participant |
| Create a Slack bot in Python | Hands on session to show participants how to create a Slack bot in Python | user-session | Mon | Eve-1,Eve-2 | participant |
| A long successful career in IT (women in tech) | Keynote by Ante Gulam | user-session | Tue | DS-2 | participant |
| Gamifying Security Dashboards | Keynote by Ante Gulam | user-session | Tue | KN-2 | participant |
| Using maps to define how to capture, detect and prevent 6 real-world security incidents | Hands on session on how to use Wardley maps | working-session | Tue | AM-1 | participant |
| Back to the future with Threat Modeling | Back to the future with Threat Modeling | working-session | Tue | PM-3 | participant |
| Creation of Security Buttons | Agile Practices for Security Teams | working-session | Tue | AM-1 | participant |
| Thinking in Graphs | Keynote by Dinis Cruz | user-session | Wed | KN-2 | participant |
| Docker and Kubernetes Threat Modeling Cheat Sheet | Docker and Kubernetes Threat Modeling Cheat Sheet | working-session | Wed | PM-1 | participant |
| How to Threat Model Features with Questionnaires | How to Threat Model Features with Questionnaires | working-session | Wed | PM-2 | participant |
| Federated Login with Social Platforms Threat Modeling Cheat Sheet | Federated Login with Social Platforms Threat Modeling Cheat Sheet | working-session | Wed | PM-3 | participant |
| Azure Security Features, Just a Few | A demonstration of a few of Azure's Security features including - Access Control (AIM), Just in Time (JIT), Security Center Recommendations, Virtual Machine Security Recommendations, and Key Vault. | product-session | Thu | AM-1 | participant |
| Threat model guide | Threat model guide with levels | working-session | Thu | PM-1 | participant |
| How to scale Threat Modeling. | How to scale Threat Modeling | working-session | Thu | PM-2 | participant |
| Crossing the river by feeling the stones | Keynote by Simon Wardley | user-session | Thu | KN-2 | participant |
| Threat Model training through Gamification | Threat Model training through Gamification | working-session | Thu | PM-3 | participant |
| Writing security tests to confirm vulnerabilities and fixes | Hands on session writing security tests | user-session | Thu | PM-1 | participant |
| Using Jira to handle Incident Response - simulations | Incident response simulations and role play scenarios | working-session | Fri | AM-1 | participant |
| Using AI and ML for incident response | How to use AI and ML for incident response | working-session | Fri | PM-1 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizersmetadata field (in this caseSara Davis)
Back to list of all Participants
