Ruben Tronçon

Security Consultant at Toreon, Toreon

Participant's team(s):

Ruben Tronçon Daily Schedule

Monday Tuesday Wednesday Thursday Friday
KN-2
9:40 - 9:55
Time slot over-subscribed
Gamifying Security Dashboards
main-stage
AM-1
10:30 - 12:30
Time slot over-subscribed
Threat model cheat sheets
Kings room
Describe different ways of implementing TM in agile organisations
Kings room
DS-2
12:30 - 13:30
Creating ELK Dashboards
Table 1
PM-1
13:30 - 15:00
Time slot over-subscribed
Threat model track opening session
Kings room
Integrating Security Tools in the SDL using OWASP DevSecOps Studio
Maulden room
Time slot over-subscribed
API Threat Modeling Cheat Sheet
Kings room
Docker and Kubernetes Threat Modeling Cheat Sheet
Kings room
PM-2
15:30 - 16:30
Time slot over-subscribed
Threat Modeling Website Structure
Kings room
Time slot over-subscribed
Attack chains as TM technique
Kings room
Time slot over-subscribed
How to Threat Model Features with Questionnaires
Kings room
secureCodeBox - How to improve your CI/CD pipeline with automated security tests
Pedley room
PM-3
16:30 - 17:30
Time slot over-subscribed
Update Treat Modeling website 1
Kings room
Time slot over-subscribed
Back to the future with Threat Modeling
Kings room
Using JIRA to create and execute Security Playbooks
Larch room
Time slot over-subscribed
SAMMv2 Establish the Document Model
311 - OWASP SAMM villa
Federated Login with Social Platforms Threat Modeling Cheat Sheet
Kings room
Eve-1
19:30 - 21:00
Update Treat Modeling website 3
320 - Threat Modeling villa
Eve-2
21:00 - 23:00
Update Treat Modeling website 2
320 - Threat Modeling villa

Participating sessions details

Title Description type When Time Acting as
Update Treat Modeling website 2 user-session Mon Eve-2 participant
Gamifying Security Dashboards Keynote by Ante Gulam user-session Tue KN-2 participant
Threat model cheat sheets Threat Modeling Working Session working-session Tue AM-1 participant
Threat model track opening session Threat Modeling track opening working-session Mon PM-1 participant
API Threat Modeling Cheat Sheet API Threat Modeling Cheat Sheet working-session Tue PM-1 participant
Threat Modeling Website Structure working-session Mon PM-2 participant
Attack chains as TM technique Threat Modeling Working Session working-session Tue PM-2 participant
Update Treat Modeling website 1 user-session Mon PM-3 participant
Back to the future with Threat Modeling Back to the future with Threat Modeling working-session Tue PM-3 participant
Update Treat Modeling website 3 Threat Modeling User Session user-session Tue Eve-1 participant
Using JIRA to create and execute Security Playbooks Hands on session on how to use JIRA for incident response user-session Tue PM-3 participant
Creating ELK Dashboards Practical session on creating ELK Dashboards user-session Tue DS-2 participant
Threat model cheat sheets Threat Modeling Working Session working-session Tue AM-1 participant
Describe different ways of implementing TM in agile organisations working-session Wed AM-1 participant
Threat model track opening session Threat Modeling track opening working-session Mon PM-1 participant
API Threat Modeling Cheat Sheet API Threat Modeling Cheat Sheet working-session Tue PM-1 participant
Docker and Kubernetes Threat Modeling Cheat Sheet Docker and Kubernetes Threat Modeling Cheat Sheet working-session Wed PM-1 participant
Integrating Security Tools in the SDL using OWASP DevSecOps Studio Using DevSecOps studio to learn and teach Integrating security tools in the SDL user-session Mon PM-1 participant
Threat Modeling Website Structure working-session Mon PM-2 participant
Attack chains as TM technique Threat Modeling Working Session working-session Tue PM-2 participant
How to Threat Model Features with Questionnaires How to Threat Model Features with Questionnaires working-session Wed PM-2 participant
secureCodeBox - How to improve your CI/CD pipeline with automated security tests Hands on session to introduce the new project secureCodeBox.io and how you could use it to improve your CI/CD pipeline with automated security tests easily. user-session Wed PM-2 participant
Update Treat Modeling website 1 user-session Mon PM-3 participant
Back to the future with Threat Modeling Back to the future with Threat Modeling working-session Tue PM-3 participant
Federated Login with Social Platforms Threat Modeling Cheat Sheet Federated Login with Social Platforms Threat Modeling Cheat Sheet working-session Wed PM-3 participant
Using JIRA to create and execute Security Playbooks Hands on session on how to use JIRA for incident response user-session Tue PM-3 participant
Gamifying Security Dashboards Keynote by Ante Gulam user-session Tue KN-2 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Ruben Tronçon)


Back to list of all Participants