Goher Mohammad

Acting Head of Risk and Compliance, Photobox GS

Sponsored By:

Participant's team(s):

Goher Mohammad Daily Schedule

MondayTuesdayWednesdayThursdayFriday
DS-1
10:00 - 10:30
GS Risk Daily Scrum (Mon)
    Table 3
    GS Risk Daily Scrum (Tue)
      Table 3
      GS Risk Daily Scrum (Wed)
        Table 3
        GS Risk Daily Scrum (Thu)
          Table 3
          GS Risk Daily Scrum (Fri)
            Table 3
            AM-1
            10:30 - 12:30
            Using maps to define how to capture, detect and prevent 6 real-world security incidents
            Larch room
            Describe different ways of implementing TM in agile organisations
            Kings room
            Wardley Mapping – a practical session on how to use value chain mapping
            Larch room
            Using Jira to handle Incident Response - simulations
            DS-2
            12:30 - 13:30
            Creating a standard for GDPR patterns
            Table 2
            Implementing the OWASP responsible disclosure Maturity Model
            Table 3
            Meet the ICO
            PM-1
            13:30 - 15:00
            Hands-on JIRA Schema refactoring
            Larch room
            Ask me anything (AMA) on GDPR
            Using User Story Mapping for effective communication
            Larch room
            Hands-on GDPR Patterns
            Portland room
            PM-2
            15:30 - 16:30
            Create Wardley Maps for multiple security scenarios
            Larch room
            Using JIRA-NeoVis to graph GDPR Data Journeys
            Larch room
            Time slot over-subscribed
            Creating an open 3rd Party Supplier Questionnaire and maturity model
            311 - OWASP SAMM villa
            JIRA Risk Workflow
            Portland room
            Owasp Testing Guide v5
            314 - Owasp Projects villa
            Squad Modelling and Cross Functional Teams
            Pedley room
            Women in Cyber-security: improving the gender balance
            Montague room
            PBX-GS Offsite session 5
            317 - Photobox villa
            PM-3
            16:30 - 17:30
            Time slot over-subscribed
            PBX-GS Offsite session 1
            314 - Owasp Projects villa
            Real world Chaos Engineering
            Pedley room
            Time slot over-subscribed
            PBX-GS Offsite session 2
            317 - Photobox villa
            Cyber Risk Modeling
            Portland room
            Using JIRA to create and execute Security Playbooks
            Larch room
            Time slot over-subscribed
            Integrating Security into an Spotify Model (and using Squads for Security teams)
            Maulden room
            GDPR Appropriate Security Controls
            Portland room
            Time slot over-subscribed
            PBX-GS Offsite session 4
            317 - Photobox villa
            Using graphs for GDPR mappings and visualisations
            Summit Wrap Up
              main-hall
              DS-3
              18:00 - 19:00
              Time slot over-subscribed
              GDPR Compliance what does it mean?
              Table 1
              Time slot over-subscribed
              Share your playbooks and release them under Creative Commons
              Table 4
              Share your security polices and release them under Creative Commons
              Table 2
              Job Fair
              Table 4
              Eve-1
              19:30 - 21:00
              Create a Slack bot in Python
              313 - DevSecCon villa
              Eve-2
              21:00 - 23:00
              Using Threat Models for GDPR
              317 - Photobox villa

              Participating sessions details

              TitleDescriptiontypeWhenTimeActing as
              Meet the ICOIf you could meet the ICO, what questions would you askworking-sessionThuDS-2participant
              Describe different ways of implementing TM in agile organisationsworking-sessionWedAM-1participant
              Cyber Risk ModelingSession on Risk Modelingworking-sessionTuePM-3participant
              Real world Chaos EngineeringAn exploration and working session to characterise, explore and implement real-world DevSecOps chaos experiments.working-sessionMonPM-3participant
              Women in Cyber-security: improving the gender balanceWhy is there a persistent gap when it comes to gender balance in security? How can we as security professionals ensure there is a fair chance and representation for all?working-sessionThuPM-2participant
              Using JIRA to create and execute Security PlaybooksHands on session on how to use JIRA for incident responseuser-sessionTuePM-3participant
              GDPR Compliance what does it mean?Now that GDPR is in force, what does GDPR Compliance mean and how to measure itworking-sessionMonDS-3participant
              Integrating Security into an Spotify Model (and using Squads for Security teams)Best practice cheat sheet for integrating Agile Security into the Spotify modelworking-sessionWedPM-3participant
              Using JIRA-NeoVis to graph GDPR Data JourneysPractical session on using the JIRA-NeoVis toolworking-sessionTuePM-2participant

              Register as organizer

              To register as an organizer of an session or track:

              • add your name to the organizers metadata field (in this case Goher Mohammad)


              Back to list of all Participants