This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Summit 2011 Working Sessions/Session099"
From OWASP
| Line 109: | Line 109: | ||
|- | |- | ||
| − | | short_working_session_description= | + | | short_working_session_description=Discussion on various components of threat modeling, threat modeling methodologies and their challenges. |
|- | |- | ||
| Line 130: | Line 130: | ||
|- | |- | ||
| − | | summit_session_objective_name1= | + | | summit_session_objective_name1= Reviewing existing methodologies and their pros and cons |
| − | | summit_session_objective_name2 = | + | | summit_session_objective_name2 = Assigning business impacts to threats |
| − | | summit_session_objective_name3 = | + | | summit_session_objective_name3 = Assigning technical impacts to threats |
| − | | summit_session_objective_name4 = | + | | summit_session_objective_name4 = Threat Rating System. |
| − | | summit_session_objective_name5 = | + | | summit_session_objective_name5 = Can we bring attack trees into main stream threat modeling methodology? |
|- | |- | ||
Revision as of 20:50, 20 January 2011
Global Summit 2011 Home Page
Global Summit 2011 Tracks
| Please see/use the 'discussion' page for more details about this Working Session | ||||||
|---|---|---|---|---|---|---|
| Working Sessions Operational Rules - Please see here the general frame of rules. |
| WORKING SESSION IDENTIFICATION | ||||||
|---|---|---|---|---|---|---|
| Short Work Session Description | Discussion on various components of threat modeling, threat modeling methodologies and their challenges. | |||||
| Related Projects (if any) |
| |||||
| Email Contacts & Roles | Chair Anurag Agarwal @ |
Operational Manager |
Mailing list {{{mailing_list}}} | |||
| WORKING SESSION SPECIFICS | ||||||
|---|---|---|---|---|---|---|
| Objectives |
| |||||
| Venue/Date&Time/Model | Venue/Room OWASP Global Summit Portugal 2011 |
Date & Time
|
Discussion Model participants and attendees | |||
| |
|---|
| WORKING SESSION OPERATIONAL RESOURCES | ||||||
|---|---|---|---|---|---|---|
| Projector, whiteboards, markers, Internet connectivity, power | ||||||
| |
|---|
| WORKING SESSION ADDITIONAL DETAILS | ||||||
|---|---|---|---|---|---|---|
| WORKING SESSION OUTCOMES / DELIVERABLES | ||
|---|---|---|
| Proposed by Working Group | Approved by OWASP Board | |
|
Existing threat modeling methodologies and their pros and cons |
After the Board Meeting - fill in here. | |
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
| After the Board Meeting - fill in here. | ||
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
| WORKING SESSION PARTICIPANTS | ||||||
|---|---|---|---|---|---|---|
| Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
| Matthew Chalmers @ |
![]() |
| ||||
| Colin Watson @ |
| |||||
| Mateo Martinez @ |
| |||||
| Dinis Cruz @ |
| |||||
| Jim Manico @ |
| |||||
| Neil Matatall @ |
| |||||
| Christian Martorella @ |
| |||||
| Steven van der Baan @ |
| |||||
| Nishi Kumar @ |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
| |
| |||||
