| GS Risk Daily Scrum (Mon) Table 3 |
| GS Risk Daily Scrum (Tue) Table 3 |
| GS Risk Daily Scrum (Wed) Table 3 |
| GS Risk Daily Scrum (Thu) Table 3 |
| GS Risk Daily Scrum (Fri) Table 3 |
|
| | Using maps to define how to capture, detect and prevent 6 real-world security incidents Larch room |
| Describe different ways of implementing TM in agile organisations Kings room |
| Wardley Mapping – a practical session on how to use value chain mapping Larch room |
| Using Jira to handle Incident Response - simulations |
|
| | Creating a standard for GDPR patterns Table 2 |
| Implementing the OWASP responsible disclosure Maturity Model Table 3 |
| | |
| Hands-on JIRA Schema refactoring Larch room |
| Ask me anything (AMA) on GDPR |
| Using User Story Mapping for effective communication Larch room |
| Hands-on GDPR Patterns Portland room |
| |
| Create Wardley Maps for multiple security scenarios Larch room |
| Using JIRA-NeoVis to graph GDPR Data Journeys Larch room |
| | Time slot over-subscribed | Creating an open 3rd Party Supplier Questionnaire and maturity model 311 - OWASP SAMM villa | JIRA Risk Workflow Portland room | Owasp Testing Guide v5 314 - Owasp Projects villa | Squad Modelling and Cross Functional Teams Pedley room | Women in Cyber-security: improving the gender balance Montague room |
| PBX-GS Offsite session 5 317 - Photobox villa |
|
| Time slot over-subscribed | PBX-GS Offsite session 1 314 - Owasp Projects villa | Real world Chaos Engineering Pedley room |
| Time slot over-subscribed | PBX-GS Offsite session 2 317 - Photobox villa | Cyber Risk Modeling Portland room | Using JIRA to create and execute Security Playbooks Larch room |
| Time slot over-subscribed | Integrating Security into an Spotify Model (and using Squads for Security teams) Maulden room | GDPR Appropriate Security Controls Portland room |
| Time slot over-subscribed | PBX-GS Offsite session 4 317 - Photobox villa | Using graphs for GDPR mappings and visualisations |
| |
| Time slot over-subscribed | GDPR Compliance what does it mean? Table 1 |
| Time slot over-subscribed | Share your playbooks and release them under Creative Commons Table 4 | Share your security polices and release them under Creative Commons Table 2 |
| | | |
| Create a Slack bot in Python 313 - DevSecCon villa |
| | | | |
| | Using Threat Models for GDPR 317 - Photobox villa |
| | | |