Jim Newman

Internal InfoSec Consultant, dunnhumby

Sponsored By:

Participant's team(s):

Jim Newman Daily Schedule

Monday Tuesday Wednesday Thursday Friday
KN-2
9:40 - 9:55
Gamifying Security Dashboards
main-stage
Crossing the river by feeling the stones
main-stage
Adding Privacy by Design in Secure Application Development
main-stage
AM-1
10:30 - 12:30
Security Ethics Checklist
Montague room
Owasp Top 5 Machine Learning risks
Portland room
DS-2
12:30 - 13:30
Creating a standard for GDPR patterns
Table 2
PM-1
13:30 - 15:00
Time slot over-subscribed
Integrating Security Tools in the SDL using OWASP DevSecOps Studio
Maulden room
Time slot over-subscribed
Creating Appsec metrics and visualisation
Maulden room
Time slot over-subscribed
Hands-on GDPR Patterns
Portland room
Running CTF Games with OWASP Juice Shop
314 - Owasp Projects villa
PM-2
15:30 - 16:30
Owasp Cloud Security Workshop (BETA)
Maulden room
Creating an open 3rd Party Supplier Questionnaire and maturity model
311 - OWASP SAMM villa
PM-3
16:30 - 17:30
GDPR Appropriate Security Controls
Portland room
Time slot over-subscribed
Using graphs for GDPR mappings and visualisations
Eve-1
19:30 - 21:00
Zap - How to use it
314 - Owasp Projects villa
Eve-2
21:00 - 23:00
Using Threat Models for GDPR
317 - Photobox villa

Participating sessions details

Title Description type When Time Acting as
Want to become a CISO? Working Session for CISOs working-session participant
Owasp Cloud Security Workshop (BETA) A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday) working-session Mon PM-2,PM-3 participant
Integrating Security Tools in the SDL using OWASP DevSecOps Studio Using DevSecOps studio to learn and teach Integrating security tools in the SDL user-session Mon PM-1 participant
Creating Appsec metrics and visualisation AppSec Metrics and Visualisation user-session Wed PM-1 participant
Using graphs for GDPR mappings and visualisations Hands on sessions of mapping GDPR data to graphs user-session Thu PM-3 participant
Creating a standard for GDPR patterns Working Session on reviewing and agreeing on a set of GDPR patterns working-session Tue DS-2 participant
Using Threat Models for GDPR Hands on user session on how to use Threat Models in GDPR mappings user-session Tue Eve-2 participant
GDPR Appropriate Security Controls Map out what these are and what is the best way to measure them working-session Wed PM-3 participant
Hands-on GDPR Patterns Using GDPR Patterns user-session Thu PM-1 participant
Gamifying Security Dashboards Keynote by Ante Gulam user-session Tue KN-2 participant
Crossing the river by feeling the stones Keynote by Simon Wardley user-session Thu KN-2 participant
Adding Privacy by Design in Secure Application Development Keynote by Sebastien Deleersnyder user-session Fri KN-2 participant
Security Ethics Checklist working-session Tue AM-1 participant
Creating an open 3rd Party Supplier Questionnaire and maturity model Create a common 3rd Party Supplier Maturity Model working-session Thu PM-2 participant
Running CTF Games with OWASP Juice Shop Running / hosting CTF games with OWASP JuiceShop user-session Thu PM-1 participant
Zap - How to use it User session to help ZAP users user-session Tue Eve-1 participant
Owasp Top 5 Machine Learning risks working-session Fri AM-1 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Jim Newman)


Back to list of all Participants