Sara Davis

IT Engineer, Centerprise International

Sponsored By:

Participant's team(s):

Sara Davis Daily Schedule

Monday Tuesday Wednesday Thursday Friday
KN-2
9:40 - 9:55
Gamifying Security Dashboards
main-stage
Thinking in Graphs
main-stage
Crossing the river by feeling the stones
main-stage
AM-1
10:30 - 12:30
Track Introductions
Larch room
Time slot over-subscribed
Using maps to define how to capture, detect and prevent 6 real-world security incidents
Larch room
Creation of Security Buttons
Pedley room
Azure Security Features, Just a Few
Pedley room
Using Jira to handle Incident Response - simulations
DS-2
12:30 - 13:30
A long successful career in IT (women in tech)
main-stage
A shared understanding of Success
main-stage
PM-1
13:30 - 15:00
Creating a Steady-State Hypothesis
Pedley room
Docker and Kubernetes Threat Modeling Cheat Sheet
Kings room
Time slot over-subscribed
Threat model guide
Kings room
Writing security tests to confirm vulnerabilities and fixes
Pedley room
Using AI and ML for incident response
Larch room
PM-2
15:30 - 16:30
Owasp Cloud Security Workshop (BETA)
Maulden room
How to Threat Model Features with Questionnaires
Kings room
How to scale Threat Modeling.
Kings room
PM-3
16:30 - 17:30
Back to the future with Threat Modeling
Kings room
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Threat Model training through Gamification
Kings room
Eve-1
19:30 - 21:00
Create a Slack bot in Python
313 - DevSecCon villa
Eve-2
21:00 - 23:00

Participating sessions details

Title Description type When Time Acting as
Track Introductions user-session Mon AM-1 participant
Creating a Steady-State Hypothesis Exploring the Chaos Toolkit's stead-state hypothesis and how one can be designed and constructed for DevSecOps concerns. working-session Mon PM-1 participant
Owasp Cloud Security Workshop (BETA) A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday) working-session Mon PM-2,PM-3 participant
Create a Slack bot in Python Hands on session to show participants how to create a Slack bot in Python user-session Mon Eve-1,Eve-2 participant
A long successful career in IT (women in tech) Keynote by Ante Gulam user-session Tue DS-2 participant
Gamifying Security Dashboards Keynote by Ante Gulam user-session Tue KN-2 participant
Using maps to define how to capture, detect and prevent 6 real-world security incidents Hands on session on how to use Wardley maps working-session Tue AM-1 participant
Back to the future with Threat Modeling Back to the future with Threat Modeling working-session Tue PM-3 participant
Creation of Security Buttons Agile Practices for Security Teams working-session Tue AM-1 participant
Thinking in Graphs Keynote by Dinis Cruz user-session Wed KN-2 participant
Docker and Kubernetes Threat Modeling Cheat Sheet Docker and Kubernetes Threat Modeling Cheat Sheet working-session Wed PM-1 participant
How to Threat Model Features with Questionnaires How to Threat Model Features with Questionnaires working-session Wed PM-2 participant
Federated Login with Social Platforms Threat Modeling Cheat Sheet Federated Login with Social Platforms Threat Modeling Cheat Sheet working-session Wed PM-3 participant
Azure Security Features, Just a Few A demonstration of a few of Azure's Security features including - Access Control (AIM), Just in Time (JIT), Security Center Recommendations, Virtual Machine Security Recommendations, and Key Vault. product-session Thu AM-1 participant
Threat model guide Threat model guide with levels working-session Thu PM-1 participant
How to scale Threat Modeling. How to scale Threat Modeling working-session Thu PM-2 participant
Crossing the river by feeling the stones Keynote by Simon Wardley user-session Thu KN-2 participant
Threat Model training through Gamification Threat Model training through Gamification working-session Thu PM-3 participant
Writing security tests to confirm vulnerabilities and fixes Hands on session writing security tests user-session Thu PM-1 participant
Using Jira to handle Incident Response - simulations Incident response simulations and role play scenarios working-session Fri AM-1 participant
Using AI and ML for incident response How to use AI and ML for incident response working-session Fri PM-1 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Sara Davis)


Back to list of all Participants