Skip to content

Commit

Permalink
fix avi doublen
Browse files Browse the repository at this point in the history
  • Loading branch information
Gil Zellner committed Oct 28, 2018
1 parent 43ded61 commit b02968d
Show file tree
Hide file tree
Showing 2 changed files with 12 additions and 1 deletion.
2 changes: 1 addition & 1 deletion content/events/2018-tel-aviv/program.md
Original file line number Diff line number Diff line change
Expand Up @@ -239,7 +239,7 @@ heading = "devopsdays Tel Aviv - Program"
<div class = "col-md-2 col-md-offset-0 box">
<a href="/events/2018-tel-aviv/program/yogev-levi">Bootstrap new organisation - the Ops side of things<br><strong>Yogev Levi Shaked</strong></a></div>
<div class = "col-md-2 col-md-offset-3 box">
<a href="/events/2018-tel-aviv/program/itai-freindinger">0Flake - Reaching reliable non-flaky tests <br><strong>Itai Freindinger</strong></a></div>
<a href="/events/2018-tel-aviv/program/itai-friendinger">0Flake - Reaching reliable non-flaky tests <br><strong>Itai Freindinger</strong></a></div>
<div class = "col-md-2 col-md-offset-6 box">
<a href="/events/2018-tel-aviv/program/avi-kivity">How to write a database <br><strong>Avi Kivity</strong></a></div>
<div class = "col-md-2 col-md-offset-8 box">
Expand Down
11 changes: 11 additions & 0 deletions content/events/2018-tel-aviv/program/avi-douglen.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
+++
Talk_date = ""
Talk_start_time = ""
Talk_end_time = ""
Title = " "
Type = "talk"
Speakers = ["avi-douglen"]
+++

Threat Modeling is a great method to identify potential security flaws, part of any secure design. But instead of investing time + budget in a top-heavy, big-model-up-front threat modeling methodology, we can use a lightweight value-driven approach to embed security right into the agile dev process!

0 comments on commit b02968d

Please sign in to comment.