Security Practice, Equal Experts
Participant's team(s):
Phil Parker Daily Schedule
Monday | Tuesday | Wednesday | Thursday | Friday | |||||
---|---|---|---|---|---|---|---|---|---|
|
| ||||||||
|
| ||||||||
|
|
| |||||||
|
|
Participating sessions details
Title | Description | type | When | Time | Acting as |
---|---|---|---|---|---|
Wardley Mapping – a practical session on how to use value chain mapping | Practical session on how to use value chain mapping. | user-session | Thu | AM-1 | participant |
Cell based Structures for Security | Spotify compliant organizational model in security domain | working-session | Thu | PM-1 | participant |
SOC Value Chain using Wardley maps | user-session | Thu | PM-2 | participant | |
Adding Privacy by Design in Secure Application Development | Keynote by Sebastien Deleersnyder | user-session | Fri | KN-2 | participant |
Using AI and ML for incident response | How to use AI and ML for incident response | working-session | Fri | PM-1 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizers
metadata field (in this casePhil Parker
)
Back to list of all Participants