Security Consultant at Toreon, Toreon
Ruben Tronçon Daily Schedule
Monday | Tuesday | Wednesday | Thursday | Friday | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
| ||||||||||||||
|
|
| |||||||||||||
|
| ||||||||||||||
|
|
|
| ||||||||||||
|
|
|
| ||||||||||||
|
|
|
| ||||||||||||
|
| ||||||||||||||
|
|
Participating sessions details
Title | Description | type | When | Time | Acting as |
---|---|---|---|---|---|
Update Treat Modeling website 2 | user-session | Mon | Eve-2 | participant | |
Gamifying Security Dashboards | Keynote by Ante Gulam | user-session | Tue | KN-2 | participant |
Threat model cheat sheets | Threat Modeling Working Session | working-session | Tue | AM-1 | participant |
Threat model track opening session | Threat Modeling track opening | working-session | Mon | PM-1 | participant |
API Threat Modeling Cheat Sheet | API Threat Modeling Cheat Sheet | working-session | Tue | PM-1 | participant |
Threat Modeling Website Structure | working-session | Mon | PM-2 | participant | |
Attack chains as TM technique | Threat Modeling Working Session | working-session | Tue | PM-2 | participant |
Update Treat Modeling website 1 | user-session | Mon | PM-3 | participant | |
Back to the future with Threat Modeling | Back to the future with Threat Modeling | working-session | Tue | PM-3 | participant |
Update Treat Modeling website 3 | Threat Modeling User Session | user-session | Tue | Eve-1 | participant |
Using JIRA to create and execute Security Playbooks | Hands on session on how to use JIRA for incident response | user-session | Tue | PM-3 | participant |
Creating ELK Dashboards | Practical session on creating ELK Dashboards | user-session | Tue | DS-2 | participant |
Threat model cheat sheets | Threat Modeling Working Session | working-session | Tue | AM-1 | participant |
Describe different ways of implementing TM in agile organisations | working-session | Wed | AM-1 | participant | |
Threat model track opening session | Threat Modeling track opening | working-session | Mon | PM-1 | participant |
API Threat Modeling Cheat Sheet | API Threat Modeling Cheat Sheet | working-session | Tue | PM-1 | participant |
Docker and Kubernetes Threat Modeling Cheat Sheet | Docker and Kubernetes Threat Modeling Cheat Sheet | working-session | Wed | PM-1 | participant |
Integrating Security Tools in the SDL using OWASP DevSecOps Studio | Using DevSecOps studio to learn and teach Integrating security tools in the SDL | user-session | Mon | PM-1 | participant |
Threat Modeling Website Structure | working-session | Mon | PM-2 | participant | |
Attack chains as TM technique | Threat Modeling Working Session | working-session | Tue | PM-2 | participant |
How to Threat Model Features with Questionnaires | How to Threat Model Features with Questionnaires | working-session | Wed | PM-2 | participant |
secureCodeBox - How to improve your CI/CD pipeline with automated security tests | Hands on session to introduce the new project secureCodeBox.io and how you could use it to improve your CI/CD pipeline with automated security tests easily. | user-session | Wed | PM-2 | participant |
Update Treat Modeling website 1 | user-session | Mon | PM-3 | participant | |
Back to the future with Threat Modeling | Back to the future with Threat Modeling | working-session | Tue | PM-3 | participant |
Federated Login with Social Platforms Threat Modeling Cheat Sheet | Federated Login with Social Platforms Threat Modeling Cheat Sheet | working-session | Wed | PM-3 | participant |
Using JIRA to create and execute Security Playbooks | Hands on session on how to use JIRA for incident response | user-session | Tue | PM-3 | participant |
Gamifying Security Dashboards | Keynote by Ante Gulam | user-session | Tue | KN-2 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizers
metadata field (in this caseRuben Tronçon
)
Back to list of all Participants