Using User Story Mapping for effective communication

Track:Maps and Graphs
When:Wed PM-1
Where:Larch
OrganizersFraser Scott Fraser Scott
ParticipantsVladimir Voskresenskiy Vladimir Voskresenskiy , Orid Ahmed Orid Ahmed , Tony Richards Tony Richards , David Jensen David Jensen , Luis Saiz Luis Saiz , Stuart Winter-Tear Stuart Winter-Tear , Tash Norris Tash Norris

Based on the work by @jeffpatton namely the presentation User Story Mapping, Discover the whole story

Explore how it relates to Threat Modeling

This paragraph from Jeff’s User Story Mapping book pretty much describes threat modeling in non-technical terms:

WHY

User story mapping is all about discovery and communication. Threat modeling is all about discovery and communication. What can threat modeling learn from user story mapping and related techniques to help make it more effective? Can using user story mapping techniques reduce the friction to getting started with threat modeling for development and engineering teams?

What

To be determined based on who’s in the room, but possibly:

  • A discussion of how user story mapping relates to threat modeling
  • Experimentation with using story maps in threat modeling

Outcomes

  • A summary of how user story mapping can work for threat modeling, and how to get started
  • A comparison with more traditional approaches to threat modeling

References

Register as participant

To register as participant add Using User Story Mapping for effective communication to either:

  1. the sessions metadata field from your participant's page (find your participant page and look for the edit link).
  2. or the participants metadata field from this git session page


Back to list of all Working Sessions