Property | Value |
---|---|
Date Created | August 16, 2022 |
Date Ended | TBD |
Slack | #wg_token (only accessible from within the company) |
Google Doc | Token Management Working Group Agenda (only accessible from within the company) |
The Token Management Working Group will deliver:
Working Group Role | Person | Title |
---|---|---|
Facilitator | James Ritchey | Sr. Security Engineering Manager |
Executive Stakeholder | Laurence Bierner | Director Security Engineering |
Member | Joaquin Fuentes | Director Security Operations |
Member | Valentine Mairet | SIRT Manager |
Member | Philippe Lafoucrière | Security Architect |
Member | Andrew Kelly | AppSec Manager |
Member | Chris Moberly | Red Team Manager |
Member | Connor Gilbert | Sr. Product Manager, Secure:Static Analysis |
Member | Grzegorz Bizon | Principal Engineer, Ops |
Member | Stan Hu | Engineering Fellow |
Member | Michelle Gill | Senior Engineering Manager, Manage |
Member | Hannah Sutor | Senior Product Manager, Manage:Auth |
Member | Alex Hanselka | Senior Site Reliability Engineer |
Member | Dominic Couture | Staff Security Engineer, Application Security |
Member | Thomas Woodham | Senior Engineering Manager, Secure |
Member | Amar Patel | Engineering Manager, Secure:Static Analysis |
Member | Zach Rice | Senior Backend Engineer, Secure:Static Analysis |
Member | Lucas Charles | Staff Backend Engineer, Secure:Static Analysis |
Member | Dennis Appelt | Staff Security Engineer, Security Research |
Member | Mark Loveless | Staff Security Engineer, Security Research |
The Token Management Working Group will work towards building a foundation and path forward for future token management security enhancements. This will be accomplished through the creation and publication of a token management security policy and proposed fixes for the high risk and low effort token management issues. With this, the Token Management Working Group will set up the fast follow on mid to long term token management security enhancement effort for success. For additional detail please visit our Token Leaks internal handbook page.