Skip to content
This repository has been archived by the owner on Nov 14, 2023. It is now read-only.

Latest commit

 

History

History
38 lines (30 loc) · 2.55 KB

File metadata and controls

38 lines (30 loc) · 2.55 KB
layout title type role time travel-from expenses funded funded-who flight-cost ticket-cost funded-amount required-funds project-leader chapter-leader job-title image email linkedin twitter facebook ticket status working-sessions
blocks/page-participant
Avi Douglen
participant
vacation
Israel
owasp
true
OWASP Community Fund + Israel chapter
700
1500
2200
2200
Israel
Israel Chapter Chairman
avi.douglen@owasp.org
avidouglen
sec_tigger
5x24h
done
Threat Modeling Scaling, Threat Modeling Cheat Sheet, Threat Modeling Templates, Lightweight Threat Modeling Process, Threat Modeling Tools,Threat Modeling Owasp Pages, Threat Modeling Diagramming Techniques, Agile Practices for Security Teams, Integrating Security into a Portfolio Kanban, Draft SAMM2 - the "DevOps release", Maturity Models tool, Creating AppSec Teams, Application Security Guide for CISO, Writing Security Tests, DevSecOps vs SecDevOps, Threat and Vulnerability Management, Implications of Owasp Top 10 2017, Owasp Chapter Treasury, OWASP Chapter Leader Handbook, SAMM - V2 Ground Rules, Threat Modeling Where do I Start?, Define Agile Security Practices, SAMM - Core Model Update 2 - Dev Methods, Hands on Threat Modeling Juice Shop (Architecture), Hands on Threat Modeling Juice Shop (New features), Hands on Threat Modeling Juice Shop (Purchase workflow), Hands on Threat Modeling Juice Shop (Attacking 1), AppSec Review and Pentest Playbook, Threat Modeling Cheat Sheet & Lightweight Threat Modeling (Part I), Threat Modeling Scaling and Security Champions, Threat Modeling Cheat Sheet & Lightweight Threat Modeling (Part II), Hands on Threat Modeling Juice Shop (Attacking 2), Threat Modeling by Feature and Layer, Using Security Risks to Measure Agile Practices, Threat Modeling IoT Devices, Closing party, Hands on Threat Modeling Juice Shop (Fixing)

I am looking forward to contributing to the Threat Modeling workshops, as I have a lot of varied experience in this area, including constrained environments, paranoid cultures (ala defense and military), limited engagements, and full-scope in-depth ongoing security teams. This is also my current area of research.

I am also interested in the SAST sessions, as well as OWASPSAMM.