Paul Dubourg

Participant's team(s):

Paul Dubourg Daily Schedule

Monday Tuesday Wednesday Thursday Friday
AM-1
10:30 - 12:30
Time slot over-subscribed
Creation of Security Buttons
Pedley room
OWASP Defect Dojo
Maulden room
Using Jira to handle Incident Response - simulations
DS-2
12:30 - 13:30
A seat at the table
main-stage
Creating ELK Dashboards
Table 1
PM-1
13:30 - 15:00
Time slot over-subscribed
DevSecOps Maturity Model (DSOMM)
Maulden room
Agile Practices for Security Teams
Larch room
AWS Lambda Security
Portland room
Hands-on GDPR Patterns
Portland room
Using AI and ML for incident response
Larch room
PM-2
15:30 - 16:30
Owasp Cloud Security Workshop (BETA)
Maulden room
JIRA Risk Workflow
Portland room
PM-3
16:30 - 17:30
Eve-2
21:00 - 23:00
Time slot over-subscribed
Using Threat Models for GDPR
317 - Photobox villa

Participating sessions details

Title Description type When Time Acting as
AWS Lambda Security How to secure Lambda functions product-session Wed PM-1 participant
Agile Practices for Security Teams Agile Practices for Security Teams working-session Tue PM-1 participant
CISO Working Sessions on topics related for CISOs and C-Level execs. track participant
Creating ELK Dashboards Practical session on creating ELK Dashboards user-session Tue DS-2 participant
Using AI and ML for incident response How to use AI and ML for incident response working-session Fri PM-1 participant
Creation of Security Buttons Agile Practices for Security Teams working-session Tue AM-1 participant
Getting more women in Cyber-security
A seat at the table Keynote by Adam user-session Mon DS-2 participant
Hands-on GDPR Patterns Using GDPR Patterns user-session Thu PM-1 participant
Using Threat Models for GDPR Hands on user session on how to use Threat Models in GDPR mappings user-session Tue Eve-2 participant
Security Playbooks
Owasp Cloud Security Workshop (BETA) A beta session of the OWASP Cloud Security Workshop (not to be scheduled on the Tuesday) working-session Mon PM-2,PM-3 participant
OWASP Defect Dojo Working Sessions for Owasp Defect Dojo working-session Tue AM-1 participant
Using The Hive for Incident Response Hands on session on using a customized version of the The Hive for Incident Response product-session participant
JIRA Risk Workflow This Working Session should result in an improved JIRA Risk Workflow working-session Thu PM-2 participant
Using Threat Models for GDPR Hands on user session on how to use Threat Models in GDPR mappings user-session Tue Eve-2 participant
Using Pixi

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Paul Dubourg)


Back to list of all Participants