layout | title | type | role | time | travel-from | expenses | funded | funded-who | flight-cost | ticket-cost | funded-amount | required-funds | project-leader | chapter-leader | job-title | image | ticket | status | working-sessions | ||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
blocks/page-participant |
Avi Douglen |
participant |
vacation |
Israel |
owasp |
true |
OWASP Community Fund + Israel chapter |
700 |
1500 |
2200 |
2200 |
Israel |
Israel Chapter Chairman |
avi.douglen@owasp.org |
avidouglen |
sec_tigger |
5x24h |
done |
Threat Modeling Scaling, Threat Modeling Cheat Sheet, Threat Modeling Templates, Lightweight Threat Modeling Process, Threat Modeling Tools,Threat Modeling Owasp Pages, Threat Modeling Diagramming Techniques, Agile Practices for Security Teams, Integrating Security into a Portfolio Kanban, Draft SAMM2 - the "DevOps release", Maturity Models tool, Creating AppSec Teams, Application Security Guide for CISO, Writing Security Tests, DevSecOps vs SecDevOps, Threat and Vulnerability Management, Implications of Owasp Top 10 2017, Owasp Chapter Treasury, OWASP Chapter Leader Handbook, SAMM - V2 Ground Rules, Threat Modeling Where do I Start?, Define Agile Security Practices, SAMM - Core Model Update 2 - Dev Methods, Hands on Threat Modeling Juice Shop (Architecture), Hands on Threat Modeling Juice Shop (New features), Hands on Threat Modeling Juice Shop (Purchase workflow), Hands on Threat Modeling Juice Shop (Attacking 1), AppSec Review and Pentest Playbook, Threat Modeling Cheat Sheet & Lightweight Threat Modeling (Part I), Threat Modeling Scaling and Security Champions, Threat Modeling Cheat Sheet & Lightweight Threat Modeling (Part II), Hands on Threat Modeling Juice Shop (Attacking 2), Threat Modeling by Feature and Layer, Using Security Risks to Measure Agile Practices, Threat Modeling IoT Devices, Closing party, Hands on Threat Modeling Juice Shop (Fixing) |
I am looking forward to contributing to the Threat Modeling workshops, as I have a lot of varied experience in this area, including constrained environments, paranoid cultures (ala defense and military), limited engagements, and full-scope in-depth ongoing security teams. This is also my current area of research.
I am also interested in the SAST sessions, as well as OWASPSAMM.
- OWASP Israel Chapter Leader, and Organizer of AppSec Israel