Internal InfoSec Consultant, dunnhumby
Jim Newman Daily Schedule
| Monday | Tuesday | Wednesday | Thursday | Friday | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
| |||||||||||
|
|
| ||||||||||||
|
| |||||||||||||
|
|
|
| |||||||||||
|
|
| ||||||||||||
|
|
| ||||||||||||
|
| |||||||||||||
|
|
Participating sessions details
| Title | Description | type | When | Time | Acting as |
|---|---|---|---|---|---|
| Want to become a CISO? | Working Session for CISOs | working-session | participant | ||
| Owasp Cloud Security Workshop (BETA) | A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday) | working-session | Mon | PM-2,PM-3 | participant |
| Integrating Security Tools in the SDL using OWASP DevSecOps Studio | Using DevSecOps studio to learn and teach Integrating security tools in the SDL | user-session | Mon | PM-1 | participant |
| Creating Appsec metrics and visualisation | AppSec Metrics and Visualisation | user-session | Wed | PM-1 | participant |
| Using graphs for GDPR mappings and visualisations | Hands on sessions of mapping GDPR data to graphs | user-session | Thu | PM-3 | participant |
| Creating a standard for GDPR patterns | Working Session on reviewing and agreeing on a set of GDPR patterns | working-session | Tue | DS-2 | participant |
| Using Threat Models for GDPR | Hands on user session on how to use Threat Models in GDPR mappings | user-session | Tue | Eve-2 | participant |
| GDPR Appropriate Security Controls | Map out what these are and what is the best way to measure them | working-session | Wed | PM-3 | participant |
| Hands-on GDPR Patterns | Using GDPR Patterns | user-session | Thu | PM-1 | participant |
| Gamifying Security Dashboards | Keynote by Ante Gulam | user-session | Tue | KN-2 | participant |
| Crossing the river by feeling the stones | Keynote by Simon Wardley | user-session | Thu | KN-2 | participant |
| Adding Privacy by Design in Secure Application Development | Keynote by Sebastien Deleersnyder | user-session | Fri | KN-2 | participant |
| Security Ethics Checklist | working-session | Tue | AM-1 | participant | |
| Creating an open 3rd Party Supplier Questionnaire and maturity model | Create a common 3rd Party Supplier Maturity Model | working-session | Thu | PM-2 | participant |
| Running CTF Games with OWASP Juice Shop | Running / hosting CTF games with OWASP JuiceShop | user-session | Thu | PM-1 | participant |
| Zap - How to use it | User session to help ZAP users | user-session | Tue | Eve-1 | participant |
| Owasp Top 5 Machine Learning risks | working-session | Fri | AM-1 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizersmetadata field (in this caseJim Newman)
Back to list of all Participants

