Phil Parker

Security Practice, Equal Experts

Participant's team(s):

Phil Parker Daily Schedule

Monday Tuesday Wednesday Thursday Friday
KN-2
9:40 - 9:55
Adding Privacy by Design in Secure Application Development
main-stage
AM-1
10:30 - 12:30
Wardley Mapping – a practical session on how to use value chain mapping
Larch room
PM-1
13:30 - 15:00
Cell based Structures for Security
Larch room
Using AI and ML for incident response
Larch room
PM-2
15:30 - 16:30
SOC Value Chain using Wardley maps
Larch room

Participating sessions details

Title Description type When Time Acting as
Wardley Mapping – a practical session on how to use value chain mapping Practical session on how to use value chain mapping. user-session Thu AM-1 participant
Cell based Structures for Security Spotify compliant organizational model in security domain working-session Thu PM-1 participant
SOC Value Chain using Wardley maps user-session Thu PM-2 participant
Adding Privacy by Design in Secure Application Development Keynote by Sebastien Deleersnyder user-session Fri KN-2 participant
Using AI and ML for incident response How to use AI and ML for incident response working-session Fri PM-1 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Phil Parker)


Back to list of all Participants