Orid Ahmed

Jr SOC Detect, Photobox GS

Sponsored By:

Participant's team(s):

    Orid Ahmed Daily Schedule

    MondayTuesdayWednesdayThursdayFriday
    AM-1
    10:30 - 12:30
    Time slot over-subscribed
    AWS WAF for DDoS Mitigation
    Portland room
    Create Docker Security Questions
    DS-2
    12:30 - 13:30
    Writing Akamai rules
    PM-1
    13:30 - 15:00
    Time slot over-subscribed
    Hands-on JIRA Schema refactoring
    Larch room
    Integrating Security Tools in the SDL using OWASP DevSecOps Studio
    Maulden room
    Time slot over-subscribed
    Akamai WAF & Ruleset
    Pedley room
    DevSecOps Maturity Model (DSOMM)
    Maulden room
    Time slot over-subscribed
    Docker and Kubernetes Threat Modeling Cheat Sheet
    Kings room
    Using User Story Mapping for effective communication
    Larch room
    PM-2
    15:30 - 16:30
    Threat Modeling Website Structure
    Kings room
    Time slot over-subscribed
    Create AWS Security Questions
    Montague room
    Cyber Insurance
    Portland room
    Time slot over-subscribed
    Securing AWS S3 Buckets
    Portland room
    SOC Monitoring Visualisation
    Maulden room
    Time slot over-subscribed
    How to scale Threat Modeling.
    Kings room
    JIRA Risk Workflow
    Portland room
    PM-3
    16:30 - 17:30
    Update Treat Modeling website 1
    Kings room
    Time slot over-subscribed
    Back to the future with Threat Modeling
    Kings room
    Cyber Risk Modeling
    Portland room
    Federated Login with Social Platforms Threat Modeling Cheat Sheet
    Kings room
    Time slot over-subscribed
    Threat Model training through Gamification
    Kings room
    Using graphs for GDPR mappings and visualisations
    Web Application Honeypot
    Portland room
    Dark and Deep Web Threat Intelligence Source
    Pedley room
    DS-3
    18:00 - 19:00
    Time slot over-subscribed
    Hands-on JIRA Schema refactoring (DS)
    main-stage
    Replacing Akamai with AWS Shield
    Table 5
    Gamification of GDPR compliance
    Table 2
    Vulnerability Intelligence Working Group
    Table 3
    Eve-2
    21:00 - 23:00
    Incident handling with DarkTrace
    317 - Photobox villa

    Participating sessions details

    TitleDescriptiontypeWhenTimeActing as
    AppSec SOC Monitoring Visualisation
    DevSecOps Maturity Model (DSOMM)DevSecOps Maturity Model (DSOMM)working-sessionTuePM-1,PM-2,PM-3participant
    Gamification of GDPR complianceHow to create positive feedback loops between the multiple teams aiming for GDPR Complianceworking-sessionWedDS-3participant
    Web Application Honeypotworking-sessionThuPM-3participant
    Incident handling with DarkTraceShare knowledge on incident handling with DarkTraceproduct-sessionWedEve-2participant
    Back to the future with Threat ModelingBack to the future with Threat Modelingworking-sessionTuePM-3participant
    Cyber Risk ModelingSession on Risk Modelingworking-sessionTuePM-3participant
    Cyber InsuranceSession on Cyber Insuranceworking-sessionTuePM-2participant
    Integrating Security into an Spotify Model
    JIRA Risk WorkflowThis Working Session should result in an improved JIRA Risk Workflowworking-sessionThuPM-2participant
    Security Playbooksparticipant
    Dark and Deep Web Threat Intelligence SourceUnderstand the Deep Web and the Dark Web How to Guard Your Network Sharing knowledge on Dark and Deep Web Open Source Intelligenceproduct-sessionThuPM-3participant

    Register as organizer

    To register as an organizer of an session or track:

    • add your name to the organizers metadata field (in this case Orid Ahmed)


    Back to list of all Participants