Summary
Work on multiple Threat Modeling topics and improve existing materials.
Schedule
Total sessions for this track: 53
| Monday | Tuesday | Wednesday | Thursday | Friday | |||
|---|---|---|---|---|---|---|---|
| |||||||
| |||||||
| |||||||
| |||||||
| |||||||
|
Sessions not mapped to an day and time
- API Threat Modeling Cheat Sheet
- Attack chains as TM technique
- Back to the future with Threat Modeling
- Convert the templates from GE-Health to risk patterns
- Create generic TM for CMS
- Creating diagrams with DOT language
- Define an Open Risk Pattern format
- Describe different ways of implementing TM in agile organisations
- Docker and Kubernetes Threat Modeling Cheat Sheet
- Federated Login with Social Platforms Threat Modeling Cheat Sheet
- How do you define and measure the value of Threat Modeling?
- How do you define and measure the value of Threat Modeling?
- How to Scale Threat Modeling.
- How to Threat Model Features with Questionnaires
- IoT Threat Modeling Cheat Sheet
- Methodology / technique showcase
- Methodology / technique showcase
- SABSA and threat modeling
- SABSA and threat modeling
- Share your Threat Models diagrams and create a Book
- Threat model cheat sheets
- Threat model closing session
- Threat model guide
- Threat model track opening session
- Threat Model training through Gamification
- Threat Modeling Website Structure
- Update Threat Modeling pages on owasp web site
- Update Threat Modeling website 1
(back to all track's schedule)
Working Sessions 23
Here are the working sessions that are currently being planned.
| Title | Track | Description |
|---|---|---|
| API Threat Modeling Cheat Sheet | Threat Model | API Threat Modeling Cheat Sheet |
| Attack chains as TM technique | Threat Model | Threat Modeling Working Session |
| Back to the future with Threat Modeling | Threat Model | Back to the future with Threat Modeling |
| Create generic TM for CMS | Threat Model | |
| Create generic TM for CMS | Threat Model | |
| Creating diagrams with DOT language | Threat Model | Creating diagrams with DOT language |
| Define an Open Risk Pattern format | Threat Model | Define a structure for defining re-usable risk patterns |
| Describe different ways of implementing TM in agile organisations | Threat Model | |
| Docker and Kubernetes Threat Modeling Cheat Sheet | Threat Model | Docker and Kubernetes Threat Modeling Cheat Sheet |
| Federated Login with Social Platforms Threat Modeling Cheat Sheet | Threat Model | Federated Login with Social Platforms Threat Modeling Cheat Sheet |
| How do you define and measure the value of Threat Modeling? | Threat Model | How do you define and measure the value of Threat Modeling? |
| How to scale Threat Modeling. | Threat Model | How to scale Threat Modeling |
| How to Threat Model Features with Questionnaires | Threat Model | How to Threat Model Features with Questionnaires |
| IoT Threat Modeling Cheat Sheet | Threat Model | IoT Threat Modeling Cheat Sheet |
| Methodology / technique showcase | Threat Model | Methodology / technique showcase |
| SABSA and threat modeling | Threat Model | SABSA and threat modeling |
| Share your Threat Models diagrams and create a Book | Threat Model | |
| Threat model cheat sheets | Threat Model | Threat Modeling Working Session |
| Threat model closing session | Threat Model | Threat Modeling Working Session |
| Threat model guide | Threat Model | Threat model guide with levels |
| Threat model track opening session | Threat Model | Threat Modeling track opening |
| Threat Model training through Gamification | Threat Model | Threat Model training through Gamification |
| Threat Modeling Website Structure | Threat Model |
User Sessions 5
Here are the users sessions that are currently being planned.
| Title | Track | Description |
|---|---|---|
| Update Treat Modeling website 1 | Threat Model | |
| Update Treat Modeling website 2 | Threat Model | |
| Update Treat Modeling website 3 | Threat Model | Threat Modeling User Session |
| Update Treat Modeling website 4 | Threat Model | Threat Modeling User Session |
| Update Treat Modeling website 5 | Threat Model |
Please help
If you want to be involved please make the changes on GitHub and send a Pull Request with your ideas.
If you feel that there is missing working session that we NEED to have at the Summit, please create it.
Metadata
| Organizers | Steven Wierckx Steven Wierckx |
|---|