Internal InfoSec Consultant, dunnhumby
Jim Newman Daily Schedule
Monday | Tuesday | Wednesday | Thursday | Friday | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
| |||||||||||
|
|
| ||||||||||||
|
| |||||||||||||
|
|
|
| |||||||||||
|
|
| ||||||||||||
|
|
| ||||||||||||
|
| |||||||||||||
|
|
Participating sessions details
Title | Description | type | When | Time | Acting as |
---|---|---|---|---|---|
Want to become a CISO? | Working Session for CISOs | working-session | participant | ||
Owasp Cloud Security Workshop (BETA) | A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday) | working-session | Mon | PM-2,PM-3 | participant |
Integrating Security Tools in the SDL using OWASP DevSecOps Studio | Using DevSecOps studio to learn and teach Integrating security tools in the SDL | user-session | Mon | PM-1 | participant |
Creating Appsec metrics and visualisation | AppSec Metrics and Visualisation | user-session | Wed | PM-1 | participant |
Using graphs for GDPR mappings and visualisations | Hands on sessions of mapping GDPR data to graphs | user-session | Thu | PM-3 | participant |
Creating a standard for GDPR patterns | Working Session on reviewing and agreeing on a set of GDPR patterns | working-session | Tue | DS-2 | participant |
Using Threat Models for GDPR | Hands on user session on how to use Threat Models in GDPR mappings | user-session | Tue | Eve-2 | participant |
GDPR Appropriate Security Controls | Map out what these are and what is the best way to measure them | working-session | Wed | PM-3 | participant |
Hands-on GDPR Patterns | Using GDPR Patterns | user-session | Thu | PM-1 | participant |
Gamifying Security Dashboards | Keynote by Ante Gulam | user-session | Tue | KN-2 | participant |
Crossing the river by feeling the stones | Keynote by Simon Wardley | user-session | Thu | KN-2 | participant |
Adding Privacy by Design in Secure Application Development | Keynote by Sebastien Deleersnyder | user-session | Fri | KN-2 | participant |
Security Ethics Checklist | working-session | Tue | AM-1 | participant | |
Creating an open 3rd Party Supplier Questionnaire and maturity model | Create a common 3rd Party Supplier Maturity Model | working-session | Thu | PM-2 | participant |
Running CTF Games with OWASP Juice Shop | Running / hosting CTF games with OWASP JuiceShop | user-session | Thu | PM-1 | participant |
Zap - How to use it | User session to help ZAP users | user-session | Tue | Eve-1 | participant |
Owasp Top 5 Machine Learning risks | working-session | Fri | AM-1 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizers
metadata field (in this caseJim Newman
)
Back to list of all Participants