This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Summit 2011 Working Sessions/Session099"
From OWASP
| Line 161: | Line 161: | ||
|summit_session_deliverable_name1 = Making threat modeling more mainstream | |summit_session_deliverable_name1 = Making threat modeling more mainstream | ||
| − | |||
|summit_session_deliverable_name2 = Clarity on various threat modeling components and how they fit in the process. | |summit_session_deliverable_name2 = Clarity on various threat modeling components and how they fit in the process. | ||
| − | |||
|summit_session_deliverable_name3 = An OWASP standard defining what a threat model is. | |summit_session_deliverable_name3 = An OWASP standard defining what a threat model is. | ||
| − | |||
|summit_session_deliverable_name4 = A white paper providing recommendations on how organizations can use threat modeling to achieve better security earlier in the process. Including a business-case rationale for threat modeling would be excellent. | |summit_session_deliverable_name4 = A white paper providing recommendations on how organizations can use threat modeling to achieve better security earlier in the process. Including a business-case rationale for threat modeling would be excellent. | ||
| − | |||
|summit_session_deliverable_name5 = | |summit_session_deliverable_name5 = | ||
| − | |||
| + | |summit_session_deliverable_name6 = | ||
| + | |||
| + | |summit_session_deliverable_name7 = | ||
| + | |||
| + | |summit_session_deliverable_name8 = | ||
|- | |- | ||
Revision as of 01:01, 26 January 2011
Global Summit 2011 Home Page
Global Summit 2011 Tracks
| Please see/use the 'discussion' page for more details about this Working Session | ||||||
|---|---|---|---|---|---|---|
| Working Sessions Operational Rules - Please see here the general frame of rules. |
| WORKING SESSION IDENTIFICATION | ||||||
|---|---|---|---|---|---|---|
| Short Work Session Description | Discussion on various components of threat modeling, threat modeling methodologies and their challenges. | |||||
| Related Projects (if any) |
| |||||
| Email Contacts & Roles | Chair Anurag Agarwal @ |
Operational Manager |
Mailing list {{{mailing_list}}} | |||
| WORKING SESSION SPECIFICS | ||||||
|---|---|---|---|---|---|---|
| Objectives |
| |||||
| Venue/Date&Time/Model | Venue/Room OWASP Global Summit Portugal 2011 |
Date & Time
|
Discussion Model participants and attendees | |||
| |
|---|
| WORKING SESSION OPERATIONAL RESOURCES | ||||||
|---|---|---|---|---|---|---|
| Projector, whiteboards, markers, Internet connectivity, power | ||||||
| |
|---|
| WORKING SESSION ADDITIONAL DETAILS | ||||||
|---|---|---|---|---|---|---|
| WORKING SESSION OUTCOMES / DELIVERABLES | ||
|---|---|---|
| Proposed by Working Group | Approved by OWASP Board | |
| After the Board Meeting - fill in here. | ||
|
Clarity on various threat modeling components and how they fit in the process. |
After the Board Meeting - fill in here. | |
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
| WORKING SESSION PARTICIPANTS | ||||||
|---|---|---|---|---|---|---|
| Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
| Matthew Chalmers @ |
![]() |
| ||||
| Colin Watson @ |
| |||||
| Mateo Martinez @ |
| |||||
| Dinis Cruz @ |
| |||||
| Jim Manico @ |
| |||||
| Neil Matatall @ |
| |||||
| Christian Martorella @ |
| |||||
| Steven van der Baan @ |
| |||||
| Nishi Kumar @ |
| |||||
| Cecil Su @ |
| |||||
| Antonio Fontes @ |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
