Phil Parker

Security Practice, Equal Experts

Participant's team(s):

    Phil Parker Daily Schedule

    MondayTuesdayWednesdayThursdayFriday
    KN-2
    9:40 - 9:55
    Adding Privacy by Design in Secure Application Development
    main-stage
    AM-1
    10:30 - 12:30
    Wardley Mapping – a practical session on how to use value chain mapping
    Larch room
    PM-1
    13:30 - 15:00
    Cell based Structures for Security
    Larch room
    Using AI and ML for incident response
    Larch room
    PM-2
    15:30 - 16:30
    SOC Value Chain using Wardley maps
    Larch room

    Participating sessions details

    TitleDescriptiontypeWhenTimeActing as
    Wardley Mapping – a practical session on how to use value chain mappingPractical session on how to use value chain mapping.user-sessionThuAM-1participant
    Cell based Structures for SecuritySpotify compliant organizational model in security domainworking-sessionThuPM-1participant
    SOC Value Chain using Wardley mapsuser-sessionThuPM-2participant
    Adding Privacy by Design in Secure Application DevelopmentKeynote by Sebastien Deleersnyderuser-sessionFriKN-2participant
    Using AI and ML for incident responseHow to use AI and ML for incident responseworking-sessionFriPM-1participant

    Register as organizer

    To register as an organizer of an session or track:

    • add your name to the organizers metadata field (in this case Phil Parker)


    Back to list of all Participants