CISO, Securestorm Ltd
Tony Richards Daily Schedule
Monday | Tuesday | Wednesday | Thursday | Friday | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
| |||||||||||||
|
|
|
| |||||||||||
|
| |||||||||||||
|
|
|
| |||||||||||
|
|
|
| |||||||||||
|
|
| ||||||||||||
|
| |||||||||||||
|
|
Participating sessions details
Title | Description | type | When | Time | Acting as |
---|---|---|---|---|---|
Using Threat Models for GDPR | Hands on user session on how to use Threat Models in GDPR mappings | user-session | Tue | Eve-2 | participant |
Agile Practices for Security Teams | Agile Practices for Security Teams | working-session | Tue | PM-1 | participant |
GDPR Appropriate Security Controls | Map out what these are and what is the best way to measure them | working-session | Wed | PM-3 | participant |
Creating a standard for GDPR patterns | Working Session on reviewing and agreeing on a set of GDPR patterns | working-session | Tue | DS-2 | participant |
GDPR Compliance what does it mean? | Now that GDPR is in force, what does GDPR Compliance mean and how to measure it | working-session | Mon | DS-3 | participant |
Cyber Risk Modeling | Session on Risk Modeling | working-session | Tue | PM-3 | participant |
Getting more women in Cyber-security | |||||
OWASP Collective Defence Cluster (CDC) - One year on | working-session | Tue | DS-2 | participant | |
Hands-on GDPR Patterns | Using GDPR Patterns | user-session | Thu | PM-1 | participant |
Using Threat Models for GDPR | Hands on user session on how to use Threat Models in GDPR mappings | user-session | Tue | Eve-2 | participant |
Ask me anything (AMA) on GDPR | Ask all the burning questions you have on GDPR | user-session | Tue | PM-1 | participant |
Crossing the river by feeling the stones | Keynote by Simon Wardley | user-session | Thu | KN-2 | participant |
A long successful career in IT (women in tech) | Keynote by Ante Gulam | user-session | Tue | DS-2 | participant |
Cell based Structures for Security | Spotify compliant organizational model in security domain | working-session | Thu | PM-1 | participant |
Create Wardley Maps for multiple security scenarios | Practical session on creating [Wardley Maps] | working-session | Mon | PM-2 | participant |
Using maps to define how to capture, detect and prevent 6 real-world security incidents | Hands on session on how to use Wardley maps | working-session | Tue | AM-1 | participant |
SOC Value Chain using Wardley maps | user-session | Thu | PM-2 | participant | |
Wardley Mapping – a practical session on how to use value chain mapping | Practical session on how to use value chain mapping. | user-session | Thu | AM-1 | participant |
Register as organizer
To register as an organizer of an session or track:
- add your name to the
organizers
metadata field (in this caseTony Richards
)
Back to list of all Participants