Lauren Chiesa

Participant's team(s):

Lauren Chiesa Daily Schedule

Monday Tuesday Wednesday Thursday Friday
KN-1
10:00 - 10:20
Security Data Science
main-stage
AM-1
10:30 - 12:30
Juice Shop 101
Montague room
Integrating Security Tools in the SDL
Maulden room
PM-1
13:30 - 15:00
Introduction to Wardley Maps
Portland room
Time slot over-subscribed
How do we persist the information from the TM Slack channel?
Larch room
Creating a generic diagram of a threat model
Larch room
Time slot over-subscribed
Integrating Security Tools in the SDL
Maulden room
Cell based Structures for Security
Portland room
PM-2
15:30 - 16:30
Security Challenges - An Introduction
Portland room
TM maturity
Larch room
Securing the CI Pipeline
Maulden room
PM-3
16:30 - 18:00
Hand's on Wardley Maps creation
Portland room
Threat Model Cookbook Project (Part 1)
Larch room
Securing the CI Pipeline
Maulden room
Eve-1
19:30 - 21:00
Creating a Security Champions network
Dinner Villa

Participating sessions details

Title Description type When Time Acting as
Wardley Maps Training (#2) New to Wardley maps? This session is for you working-session Mon TS-4 participant
Threat Modeling Training (#3) Training Threat Modeling (3rd session) working-session Mon TS-5 participant
OWASP SAMM Training (#3) Training OWASP SAMM (3rd session) working-session Mon TS-6 participant
Security Challenges - An Introduction Introduction and overview working-session Mon PM-2 participant
Hand's on Wardley Maps creation Want to have a go at creating your own Wardley maps? This training session will give you hands on experience in creating maps for multiple scenarios, with experienced practitioners on hand to guide and help you. working-session Mon PM-3 participant
Introduction to Wardley Maps New to Wardley maps? This session is for you working-session Mon PM-1 participant
How do we persist the information from the TM Slack channel? How do we persist the information from the TM Slack channel? working-session Tue PM-1 participant
Creating a generic diagram of a threat model Creating a generic diagram of a threat model working-session Tue PM-1 participant
TM maturity How do we measure the maturity of TM working-session Tue PM-2 participant
Threat Model Cookbook Project (Part 1) Kick off of the OWASP Threat Model Cookbook Project working-session Tue PM-3 participant
Zap - How to use it
Juice Shop 101 OWASP Juice Shop introduction for newbies user-session Tue AM-1 participant
Security Data Science Expect Graphs, and Jypiter notebooks ... keynote Tue KN-1 participant
threat pattern libraries
Creating a Security Champions network working-session Wed Eve-1 participant
Integrating Security Tools in the SDL Integrate security tools as part of CI/CD pipeline to find/fix issues early in SDL working-session Thu AM-1,PM-1 participant
Cell based Structures for Security Cell based Structures for Security - Small autonomous security teams and the use of Pioneers, Settlers and Town Planners (PST) working-session Thu PM-1 participant
Securing the CI Pipeline Secure the CI/CD pipeline working-session Thu PM-2,PM-3 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Lauren Chiesa)


Back to list of all Participants