Sara Davis

IT Engineer, Centerprise International

Sponsored By:

Participant's team(s):

Sara Davis Daily Schedule

MondayTuesdayWednesdayThursdayFriday
KN-2
9:40 - 9:55
Gamifying Security Dashboards
main-stage
Thinking in Graphs
main-stage
Crossing the river by feeling the stones
main-stage
AM-1
10:30 - 12:30
Track Introductions
Larch room
Time slot over-subscribed
Using maps to define how to capture, detect and prevent 6 real-world security incidents
Larch room
Creation of Security Buttons
Pedley room
Azure Security Features, Just a Few
Pedley room
Using Jira to handle Incident Response - simulations
DS-2
12:30 - 13:30
A long successful career in IT (women in tech)
main-stage
A shared understanding of Success
main-stage
PM-1
13:30 - 15:00
Creating a Steady-State Hypothesis
Pedley room
Docker and Kubernetes Threat Modeling Cheat Sheet
Kings room
Time slot over-subscribed
Threat model guide
Kings room
Writing security tests to confirm vulnerabilities and fixes
Pedley room
Using AI and ML for incident response
Larch room
PM-2
15:30 - 16:30
Owasp Cloud Security Workshop (BETA)
Maulden room
How to Threat Model Features with Questionnaires
Kings room
How to scale Threat Modeling.
Kings room
PM-3
16:30 - 17:30
Back to the future with Threat Modeling
Kings room
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Threat Model training through Gamification
Kings room
Eve-1
19:30 - 21:00
Create a Slack bot in Python
313 - DevSecCon villa
Eve-2
21:00 - 23:00

Participating sessions details

TitleDescriptiontypeWhenTimeActing as
Track Introductionsuser-sessionMonAM-1participant
Creating a Steady-State HypothesisExploring the Chaos Toolkit's stead-state hypothesis and how one can be designed and constructed for DevSecOps concerns.working-sessionMonPM-1participant
Owasp Cloud Security Workshop (BETA)A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday)working-sessionMonPM-2,PM-3participant
Create a Slack bot in PythonHands on session to show participants how to create a Slack bot in Pythonuser-sessionMonEve-1,Eve-2participant
A long successful career in IT (women in tech)Keynote by Ante Gulamuser-sessionTueDS-2participant
Gamifying Security DashboardsKeynote by Ante Gulamuser-sessionTueKN-2participant
Using maps to define how to capture, detect and prevent 6 real-world security incidentsHands on session on how to use Wardley mapsworking-sessionTueAM-1participant
Back to the future with Threat ModelingBack to the future with Threat Modelingworking-sessionTuePM-3participant
Creation of Security ButtonsAgile Practices for Security Teamsworking-sessionTueAM-1participant
Thinking in GraphsKeynote by Dinis Cruzuser-sessionWedKN-2participant
Docker and Kubernetes Threat Modeling Cheat SheetDocker and Kubernetes Threat Modeling Cheat Sheetworking-sessionWedPM-1participant
How to Threat Model Features with QuestionnairesHow to Threat Model Features with Questionnairesworking-sessionWedPM-2participant
Federated Login with Social Platforms Threat Modeling Cheat SheetFederated Login with Social Platforms Threat Modeling Cheat Sheetworking-sessionWedPM-3participant
Azure Security Features, Just a FewA demonstration of a few of Azure's Security features including - Access Control (AIM), Just in Time (JIT), Security Center Recommendations, Virtual Machine Security Recommendations, and Key Vault.product-sessionThuAM-1participant
Threat model guideThreat model guide with levelsworking-sessionThuPM-1participant
How to scale Threat Modeling.How to scale Threat Modelingworking-sessionThuPM-2participant
Crossing the river by feeling the stonesKeynote by Simon Wardleyuser-sessionThuKN-2participant
Threat Model training through GamificationThreat Model training through Gamificationworking-sessionThuPM-3participant
Writing security tests to confirm vulnerabilities and fixesHands on session writing security testsuser-sessionThuPM-1participant
Using Jira to handle Incident Response - simulationsIncident response simulations and role play scenariosworking-sessionFriAM-1participant
Using AI and ML for incident responseHow to use AI and ML for incident responseworking-sessionFriPM-1participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Sara Davis)


Back to list of all Participants