Imran Mohammed A

Co-Founder, Teachera

Author of Practical DevSecOps, DevSecOps Studio and Integra Projects.

Participant's team(s):

Imran Mohammed A Daily Schedule

NOTE: exact session days/times are not final and can change.

Monday Tuesday Wednesday Thursday Friday
AM-1
10:30 - 12:30
Integrating Security Tools in the SDL
Maulden room
PM-1
13:30 - 15:00
Time slot over-subscribed
DevSecOps Maturity Model (DSOMM)
Maulden room
Agile Practices for Security Teams
Larch room
Time slot over-subscribed
Creating Appsec metrics and visualisation
Maulden room
Describe different ways of implementing TM in agile organisations
Kings room
Time slot over-subscribed
From Threat Modeling to DevSecOps metrics
Maulden room
Integrating Security Tools in the SDL
Maulden room
PM-2
15:30 - 16:30
DevSecOps Maturity Model (DSOMM)
Maulden room
Securing the CI Pipeline
Maulden room
PM-3
16:30 - 17:30
DevSecOps Maturity Model (DSOMM)
Maulden room
Securing the CI Pipeline
Maulden room
Eve-2
21:00 - 23:00
Using Threat Models for GDPR
317 - Photobox villa

Participating sessions details

Title Description type When Time Acting as
Creating Appsec metrics and visualisation AppSec Metrics and Visualisation user-session Wed PM-1 organiser
DevSecOps Sessions focusing on the DevSecOps tools and techniques to embed security as part of CI/CD pipelines track Wed,Thu organiser
DevSecOps Maturity Model (DSOMM) DevSecOps Maturity Model (DSOMM) working-session Tue PM-1,PM-2,PM-3 organiser
From Threat Modeling to DevSecOps metrics working-session Thu PM-1 organiser
Integrating Security Tools in the SDL Integrate security tools as part of CI/CD pipeline to find/fix issues early in SDL working-session Thu AM-1, PM-1 organiser
Securing the CI Pipeline Secure the CI/CD pipeline working-session Thu PM-2,PM-3 organiser
OWASP Devslop project
Security Champions
AWS Lambda Security
Agile Practices for Security Teams Agile Practices for Security Teams working-session Tue PM-1 participant
CISO Working Sessions on topics related for CISOs and C-Level execs. track participant
Hands-on GDPR Patterns
Using Threat Models for GDPR Hands on user session on how to use Threat Models in GDPR mappings working-session Tue Eve-2 participant
Security Playbooks
SAMM DevSecOps Version
Pixi Roadmap and Enhancement
Adding security to VSTS pipeline
How to scale Threat Modeling
Describe different ways of implementing TM in agile organisations working-session Wed PM-1 participant
Docker and Kubernetes Threat Modeling Cheat Sheet

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Imran Mohammed A)


Back to list of all Participants