This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Summit 2011 Working Sessions/Session099"
From OWASP
| Line 158: | Line 158: | ||
|- | |- | ||
| − | |summit_session_deliverable_name1 = | + | |summit_session_deliverable_name1 = Existing threat modeling methodologies and their pros and cons |
|summit_session_deliverable_url_1 = | |summit_session_deliverable_url_1 = | ||
| − | |summit_session_deliverable_name2 = | + | |summit_session_deliverable_name2 = Various components of threat modeling methodology |
|summit_session_deliverable_url_2 = | |summit_session_deliverable_url_2 = | ||
Revision as of 21:33, 19 January 2011
Global Summit 2011 Home Page
Global Summit 2011 Tracks
| Threat Modeling methodology | ||||||
|---|---|---|---|---|---|---|
| Please see/use the 'discussion' page for more details about this Working Session | ||||||
| Working Sessions Operational Rules - Please see here the general frame of rules. |
| WORKING SESSION IDENTIFICATION | ||||||
|---|---|---|---|---|---|---|
| Short Work Session Description | Discuss on various components of threat modeling. Various threat modeling methodologies and their challenges. This is a new idea and will have more details coming soon. If you have an idea to discuss, please email Anurag Agarwal at [email protected] | |||||
| Related Projects (if any) |
| |||||
| Email Contacts & Roles | Chair Anurag Agarwal @ |
Operational Manager |
Mailing list {{{mailing_list}}} | |||
| WORKING SESSION SPECIFICS | ||||||
|---|---|---|---|---|---|---|
| Objectives | ||||||
| Venue/Date&Time/Model | Venue/Room OWASP Global Summit Portugal 2011 |
Date & Time
|
Discussion Model participants and attendees | |||
| |
|---|
| WORKING SESSION OPERATIONAL RESOURCES | ||||||
|---|---|---|---|---|---|---|
| Projector, whiteboards, markers, Internet connectivity, power | ||||||
| |
|---|
| WORKING SESSION ADDITIONAL DETAILS | ||||||
|---|---|---|---|---|---|---|
| WORKING SESSION OUTCOMES / DELIVERABLES | ||
|---|---|---|
| Proposed by Working Group | Approved by OWASP Board | |
|
Existing threat modeling methodologies and their pros and cons |
After the Board Meeting - fill in here. | |
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
| WORKING SESSION PARTICIPANTS | ||||||
|---|---|---|---|---|---|---|
| Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
| |
|
| ||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||