| | Using maps to define how to capture, detect and prevent 6 real-world security incidents Larch room |
| Using JIRA-NeoVis to graph Threat Models |
| Wardley Mapping – a practical session on how to use value chain mapping Larch room |
| Using JIRA-NeoVis to create graphical representations of JIRA data Larch room |
|
| | Creating ELK Dashboards Table 1 |
| | Using Data Science for log analysis Table 3 |
| |
| | | Using User Story Mapping for effective communication Larch room |
| Cell based Structures for Security Larch room |
| |
| Create Wardley Maps for multiple security scenarios Larch room |
| Using JIRA-NeoVis to graph GDPR Data Journeys Larch room |
| | SOC Value Chain using Wardley maps Larch room |
| |