Orid Ahmed

Jr SOC Detect, Photobox GS

Sponsored By:

Participant's team(s):

Orid Ahmed Daily Schedule

Monday Tuesday Wednesday Thursday Friday
AM-1
10:30 - 12:30
Time slot over-subscribed
AWS WAF for DDoS Mitigation
Portland room
Create Docker Security Questions
DS-2
12:30 - 13:30
Writing Akamai rules
PM-1
13:30 - 15:00
Time slot over-subscribed
Hands-on JIRA Schema refactoring
Larch room
Integrating Security Tools in the SDL using OWASP DevSecOps Studio
Maulden room
Time slot over-subscribed
Akamai WAF & Ruleset
Pedley room
DevSecOps Maturity Model (DSOMM)
Maulden room
Time slot over-subscribed
Docker and Kubernetes Threat Modeling Cheat Sheet
Kings room
Using User Story Mapping for effective communication
Larch room
PM-2
15:30 - 16:30
Threat Modeling Website Structure
Kings room
Time slot over-subscribed
Create AWS Security Questions
Montague room
Cyber Insurance
Portland room
Time slot over-subscribed
SOC Monitoring Visualisation
Maulden room
Securing AWS S3 Buckets
Portland room
Time slot over-subscribed
How to scale Threat Modeling.
Kings room
JIRA Risk Workflow
Portland room
PM-3
16:30 - 17:30
Update Treat Modeling website 1
Kings room
Time slot over-subscribed
Back to the future with Threat Modeling
Kings room
Cyber Risk Modeling
Portland room
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Time slot over-subscribed
Threat Model training through Gamification
Kings room
Using graphs for GDPR mappings and visualisations
Web Application Honeypot
Portland room
Dark and Deep Web Threat Intelligence Source
Pedley room
DS-3
18:00 - 19:00
Time slot over-subscribed
Hands-on JIRA Schema refactoring (DS)
main-stage
Replacing Akamai with AWS Shield
Table 5
Gamification of GDPR compliance
Table 2
Vulnerability Intelligence Working Group
Table 3
Eve-2
21:00 - 23:00
Incident handling with DarkTrace
317 - Photobox villa

Participating sessions details

Title Description type When Time Acting as
AppSec SOC Monitoring Visualisation
DevSecOps Maturity Model (DSOMM) DevSecOps Maturity Model (DSOMM) working-session Tue PM-1,PM-2,PM-3 participant
Gamification of GDPR compliance How to create positive feedback loops between the multiple teams aiming for GDPR Compliance working-session Wed DS-3 participant
Web Application Honeypot working-session Thu PM-3 participant
Incident handling with DarkTrace Share knowledge on incident handling with DarkTrace product-session Wed Eve-2 participant
Back to the future with Threat Modeling Back to the future with Threat Modeling working-session Tue PM-3 participant
Cyber Risk Modeling Session on Risk Modeling working-session Tue PM-3 participant
Cyber Insurance Session on Cyber Insurance working-session Tue PM-2 participant
Integrating Security into an Spotify Model
JIRA Risk Workflow This Working Session should result in an improved JIRA Risk Workflow working-session Thu PM-2 participant
Security Playbooks
Dark and Deep Web Threat Intelligence Source Understand the Deep Web and the Dark Web How to Guard Your Network Sharing knowledge on Dark and Deep Web Open Source Intelligence product-session Thu PM-3 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Orid Ahmed)


Back to list of all Participants