Tony Richards

CISO, Securestorm Ltd

Participant's team(s):

Tony Richards Daily Schedule

Monday Tuesday Wednesday Thursday Friday
KN-2
9:40 - 9:55
Crossing the river by feeling the stones
main-stage
AM-1
10:30 - 12:30
Track Introductions
Larch room
Time slot over-subscribed
Using maps to define how to capture, detect and prevent 6 real-world security incidents
Larch room
Time slot over-subscribed
Azure Security Features, Just a Few
Pedley room
Wardley Mapping – a practical session on how to use value chain mapping
Larch room
DS-2
12:30 - 13:30
Time slot over-subscribed
Creating a standard for GDPR patterns
Table 2
OWASP Collective Defence Cluster (CDC) - One year on
Table 3
A long successful career in IT (women in tech)
main-stage
PM-1
13:30 - 15:00
Time slot over-subscribed
Ask me anything (AMA) on GDPR
Agile Practices for Security Teams
Larch room
Using User Story Mapping for effective communication
Larch room
Time slot over-subscribed
Cell based Structures for Security
Larch room
Hands-on GDPR Patterns
Portland room
PM-2
15:30 - 16:30
Create Wardley Maps for multiple security scenarios
Larch room
How to Threat Model Features with Questionnaires
Kings room
Time slot over-subscribed
CISO Ask Me Anything (AMA)
Invited
SOC Value Chain using Wardley maps
Larch room
PM-3
16:30 - 17:30
Time slot over-subscribed
Cyber Risk Modeling
Portland room
Time slot over-subscribed
GDPR Appropriate Security Controls
Portland room
DS-3
18:00 - 19:00
GDPR Compliance what does it mean?
Table 1
Eve-2
21:00 - 23:00
Time slot over-subscribed
Using Threat Models for GDPR
317 - Photobox villa

Participating sessions details

Title Description type When Time Acting as
Using Threat Models for GDPR Hands on user session on how to use Threat Models in GDPR mappings user-session Tue Eve-2 participant
Agile Practices for Security Teams Agile Practices for Security Teams working-session Tue PM-1 participant
GDPR Appropriate Security Controls Map out what these are and what is the best way to measure them working-session Wed PM-3 participant
Creating a standard for GDPR patterns Working Session on reviewing and agreeing on a set of GDPR patterns working-session Tue DS-2 participant
GDPR Compliance what does it mean? Now that GDPR is in force, what does GDPR Compliance mean and how to measure it working-session Mon DS-3 participant
Cyber Risk Modeling Session on Risk Modeling working-session Tue PM-3 participant
Getting more women in Cyber-security
OWASP Collective Defence Cluster (CDC) - One year on working-session Tue DS-2 participant
Hands-on GDPR Patterns Using GDPR Patterns user-session Thu PM-1 participant
Using Threat Models for GDPR Hands on user session on how to use Threat Models in GDPR mappings user-session Tue Eve-2 participant
Ask me anything (AMA) on GDPR Ask all the burning questions you have on GDPR user-session Tue PM-1 participant
Crossing the river by feeling the stones Keynote by Simon Wardley user-session Thu KN-2 participant
A long successful career in IT (women in tech) Keynote by Ante Gulam user-session Tue DS-2 participant
Cell based Structures for Security Spotify compliant organizational model in security domain working-session Thu PM-1 participant
Create Wardley Maps for multiple security scenarios Practical session on creating [Wardley Maps] working-session Mon PM-2 participant
Using maps to define how to capture, detect and prevent 6 real-world security incidents Hands on session on how to use Wardley maps working-session Tue AM-1 participant
SOC Value Chain using Wardley maps user-session Thu PM-2 participant
Wardley Mapping – a practical session on how to use value chain mapping Practical session on how to use value chain mapping. user-session Thu AM-1 participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Tony Richards)


Back to list of all Participants