This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Summit 2011 Working Sessions/Session099"
From OWASP
| Line 104: | Line 104: | ||
| summit_track_logo = | | summit_track_logo = | ||
| summit_ws_logo = | | summit_ws_logo = | ||
| − | | summit_session_name = Threat Modeling | + | | summit_session_name = Threat Modeling |
| − | | summit_session_url = | + | | summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session099 |
|- | |- | ||
| Line 130: | Line 130: | ||
|- | |- | ||
| − | | summit_session_objective_name1= | + | | summit_session_objective_name1= Discuss on various components of threat modeling |
| − | | summit_session_objective_name2 = | + | | summit_session_objective_name2 = Various threat modeling methodologies and their challenges |
| − | | summit_session_objective_name3 = | + | | summit_session_objective_name3 = If you have an idea to discuss, please email Anurag Agarwal at [email protected] |
| summit_session_objective_name4 = | | summit_session_objective_name4 = | ||
Revision as of 23:21, 19 January 2011
Global Summit 2011 Home Page
Global Summit 2011 Tracks
| Threat Modeling | ||||||
|---|---|---|---|---|---|---|
| Please see/use the 'discussion' page for more details about this Working Session | ||||||
| Working Sessions Operational Rules - Please see here the general frame of rules. |
| WORKING SESSION IDENTIFICATION | ||||||
|---|---|---|---|---|---|---|
| Short Work Session Description | Discuss on various components of threat modeling. Various threat modeling methodologies and their challenges. This is a new idea and will have more details coming soon. If you have an idea to discuss, please email Anurag Agarwal at [email protected] | |||||
| Related Projects (if any) |
| |||||
| Email Contacts & Roles | Chair Anurag Agarwal @ |
Operational Manager |
Mailing list {{{mailing_list}}} | |||
| WORKING SESSION SPECIFICS | ||||||
|---|---|---|---|---|---|---|
| Objectives |
| |||||
| Venue/Date&Time/Model | Venue/Room OWASP Global Summit Portugal 2011 |
Date & Time
|
Discussion Model participants and attendees | |||
| |
|---|
| WORKING SESSION OPERATIONAL RESOURCES | ||||||
|---|---|---|---|---|---|---|
| Projector, whiteboards, markers, Internet connectivity, power | ||||||
| |
|---|
| WORKING SESSION ADDITIONAL DETAILS | ||||||
|---|---|---|---|---|---|---|
| WORKING SESSION OUTCOMES / DELIVERABLES | ||
|---|---|---|
| Proposed by Working Group | Approved by OWASP Board | |
|
Existing threat modeling methodologies and their pros and cons |
After the Board Meeting - fill in here. | |
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
| WORKING SESSION PARTICIPANTS | ||||||
|---|---|---|---|---|---|---|
| Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
| |
|
| ||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||