Track: | Maps and Graphs |
---|---|
When: | Wed PM-1 |
Where: | Larch |
Organizers | Fraser Scott Fraser Scott |
Participants | Vladimir Voskresenskiy Vladimir Voskresenskiy , Orid Ahmed Orid Ahmed , Tony Richards Tony Richards , David Jensen David Jensen , Luis Saiz Luis Saiz , Stuart Winter-Tear Stuart Winter-Tear , Tash Norris Tash Norris |
Based on the work by @jeffpatton namely the presentation User Story Mapping, Discover the whole story
Explore how it relates to Threat Modeling
This paragraph from Jeff’s User Story Mapping book pretty much describes threat modeling in non-technical terms:
WHY
User story mapping is all about discovery and communication. Threat modeling is all about discovery and communication. What can threat modeling learn from user story mapping and related techniques to help make it more effective? Can using user story mapping techniques reduce the friction to getting started with threat modeling for development and engineering teams?
What
To be determined based on who’s in the room, but possibly:
- A discussion of how user story mapping relates to threat modeling
- Experimentation with using story maps in threat modeling
Outcomes
- A summary of how user story mapping can work for threat modeling, and how to get started
- A comparison with more traditional approaches to threat modeling
References
Register as participant
To register as participant add Using User Story Mapping for effective communication
to either:
- the
sessions
metadata field from your participant's page (find your participant page and look for the edit link). - or the
participants
metadata field from this git session page
Back to list of all Working Sessions