This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Summit 2011 Working Sessions/Session099"
From OWASP
Line 109: | Line 109: | ||
|- | |- | ||
− | | short_working_session_description= | + | | short_working_session_description=Discussion on various components of threat modeling, threat modeling methodologies and their challenges. |
|- | |- | ||
Line 130: | Line 130: | ||
|- | |- | ||
− | | summit_session_objective_name1= | + | | summit_session_objective_name1= Reviewing existing methodologies and their pros and cons |
− | | summit_session_objective_name2 = | + | | summit_session_objective_name2 = Assigning business impacts to threats |
− | | summit_session_objective_name3 = | + | | summit_session_objective_name3 = Assigning technical impacts to threats |
− | | summit_session_objective_name4 = | + | | summit_session_objective_name4 = Threat Rating System. |
− | | summit_session_objective_name5 = | + | | summit_session_objective_name5 = Can we bring attack trees into main stream threat modeling methodology? |
|- | |- |
Revision as of 20:50, 20 January 2011
Global Summit 2011 Home Page
Global Summit 2011 Tracks
Threat Modeling | ||||||
---|---|---|---|---|---|---|
Please see/use the 'discussion' page for more details about this Working Session | ||||||
Working Sessions Operational Rules - Please see here the general frame of rules. |
WORKING SESSION IDENTIFICATION | ||||||
---|---|---|---|---|---|---|
Short Work Session Description | Discussion on various components of threat modeling, threat modeling methodologies and their challenges. | |||||
Related Projects (if any) |
| |||||
Email Contacts & Roles | Chair Anurag Agarwal @ |
Operational Manager |
Mailing list {{{mailing_list}}} |
WORKING SESSION SPECIFICS | ||||||
---|---|---|---|---|---|---|
Objectives |
| |||||
Venue/Date&Time/Model | Venue/Room OWASP Global Summit Portugal 2011 |
Date & Time
|
Discussion Model participants and attendees |
|
---|
WORKING SESSION OPERATIONAL RESOURCES | ||||||
---|---|---|---|---|---|---|
Projector, whiteboards, markers, Internet connectivity, power |
|
---|
WORKING SESSION ADDITIONAL DETAILS | ||||||
---|---|---|---|---|---|---|
WORKING SESSION OUTCOMES / DELIVERABLES | ||
---|---|---|
Proposed by Working Group | Approved by OWASP Board | |
Existing threat modeling methodologies and their pros and cons |
After the Board Meeting - fill in here. | |
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. | ||
After the Board Meeting - fill in here. |
Working Session Participants
(Add you name by clicking "edit" on the tab on the upper left side of this page)
WORKING SESSION PARTICIPANTS | ||||||
---|---|---|---|---|---|---|
Name | Company | Notes & reason for participating, issues to be discussed/addressed | ||||
Matthew Chalmers @ |
|
| ||||
Colin Watson @ |
| |||||
Mateo Martinez @ |
| |||||
Dinis Cruz @ |
| |||||
Jim Manico @ |
| |||||
Neil Matatall @ |
| |||||
Christian Martorella @ |
| |||||
Steven van der Baan @ |
| |||||
Nishi Kumar @ |
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
| |||||
|
|