layout | title | type | job-title | company | travel-from | image | website | project-leader | chapter-leader | ticket | status | working-sessions | ||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
blocks/page-participant |
Jonathon Brookfield |
participant |
Director, Security Research |
BlackBerry |
jonathon_b |
5x8h |
empty |
SAMM - Kick Off, SAMM - V2 Ground Rules, SAMM - Conducting Assessments, Threat Modeling Diagramming Techniques, Threat Modeling Where do I Start?, Hands on Threat Modeling Juice Shop (Architecture), Hands on Threat Modeling Juice Shop (Deployment & Operations), Hands on Threat Modeling Juice Shop (New features), Security Champions, Hands on Threat Modeling Juice Shop (Attacking 1), Security Guidance and Feedback in IDE, Software Defined Everything (SDx), Owasp Orizon Reboot, Securing Legacy Applications, Hands on Threat Modeling Juice Shop (Attacking 2), Teaching Attacker perspective to Developers, Integrating Security into an Spotify Model, Closing party, Machine Learning and Security, Scaling Static Analysis Reviews and Deployments, Visit Bletchley Park |
This repository has been archived by the owner on Nov 14, 2023. It is now read-only.