| | Creating a standard for GDPR patterns Table 2 |
| DPO how to become one Table 2 |
| | |
| | Time slot over-subscribed | Ask me anything (AMA) on GDPR |
| Creating Appsec metrics and visualisation Maulden room |
| Hands-on GDPR Patterns Portland room |
| Share your Threat Models diagrams and create a Book Kings room |
|
| | Cyber Insurance Portland room |
| SAMMv2 Measurement Model 311 - OWASP SAMM villa |
| Women in Cyber-security: improving the gender balance Montague room |
| |
| | | GDPR Appropriate Security Controls Portland room |
| Time slot over-subscribed | Using graphs for GDPR mappings and visualisations |
| |
| GDPR Compliance what does it mean? Table 1 |
| Time slot over-subscribed | European GDPR variations Table 2 | Share your security polices and release them under Creative Commons Table 2 |
| Time slot over-subscribed | DPO what to expect Table 1 | Gamification of GDPR compliance Table 2 |
| | |
| | Using Threat Models for GDPR 317 - Photobox villa |
| | | |