Speaker

Audrey Long

Audrey Long

Sr. Security Cloud Security Architect

Redmond, Washington, United States

Actions

Audrey Long is a Gaming Cloud Security Architect at Microsoft apart of the Microsoft Gaming Security team. With a keen eye for creating secure coding solutions and performing comprehensive security risk assessments, Audrey excels in threat modeling and evaluating security in architecture. Her expertise extends to implementing robust security practices that safeguard digital landscapes.
Passionate about making security accessible, Audrey is dedicated to empowering software engineers and inspiring girls to pursue careers in STEM. She holds a DoD secret clearance and a Master of Science degree in Cyber Security from Johns Hopkins. Additionally, Audrey is a proud ambassador for Google's Women Techmakers program, championing diversity and inclusion in tech.
As an international speaker, Audrey has shared her insights and expertise at conferences and events around the world, inspiring audiences with her knowledge and passion for cybersecurity.

Area of Expertise

  • Business & Management
  • Finance & Banking
  • Government, Social Sector & Education
  • Humanities & Social Sciences
  • Information & Communications Technology

Topics

  • Security
  • Cloud Security
  • cyber security
  • Azure Security
  • Application Security
  • Information Security
  • IT Security
  • Security & Compliance
  • Cloud App Security
  • Cloud Security Architecture
  • Data Security
  • Microsoft 365 Security
  • api security
  • web security
  • Enterprise Security
  • Cyber Security basics
  • Enterprise Mobility and Security
  • network security
  • DevSecOps
  • DevOps
  • Women in Tech
  • Women in Technology
  • Women Techmakers
  • Women in Cyber
  • Identity
  • Identity Management
  • identity & authentication
  • Identity Governance
  • Identity and Access Management security and Least-privilege Authorization
  • Azure Identity Management
  • Microsoft Identity
  • Microsoft Entra Privileged Identity Management
  • Microsoft Entra
  • EntraID
  • Microsoft Entra ID
  • Entra

Threat Modeling: Star Wars Edition

This talk will walk through threat modeling fundamentals with a fun Star Wars twist! Even what may seem the most impenetrable, will always have a secret way in that can be exploited. Be it an error in code, an unaccounted-for perspective, or a convenient airshaft leading to the center of a giant, black, round space craft, a developer must be aware of potential weaknesses. Using threat models is like getting the blueprint to the Death Star. They allow you to plan for potential scenarios or ambush attacks from storm troopers with impossibly bad aim. Understanding the possible risks ensures your entire team will make it back to the millennium falcon. In this talk, {redacted} will walk you through understanding threats in a cloud system and how to protect yourself from the dark side.

Automating Threat Modeling: Challenges and AI Solutions

Threat modeling is essential for identifying and mitigating cybersecurity risks, but manual processes can be slow and error-prone. This talk explores how AI can accelerate and enhance threat modeling.

We will begin by discussing the challenge of threat modeling tools becoming obsolete due to the rapid pace of development in the tech space. We will then introduce a C# tool that automates attack tree creation, highlighting its features.

Real-world examples will demonstrate how AI streamlines threat modeling, increasing efficiency and ensuring consistency. We will also discuss the challenges of automating threat modeling, including analyzing system architectures and identifying attack vectors.

Additionally, we will address AI's limitations in threat modeling and mitigation strategies.

Whether you're new to threat modeling or want to improve existing practices, this talk will show you how AI can revolutionize your cybersecurity approach.

Audrey Long

Sr. Security Cloud Security Architect

Redmond, Washington, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top