Tony Richards

CISO, Securestorm Ltd

Participant's team(s):

Tony Richards Daily Schedule

MondayTuesdayWednesdayThursdayFriday
KN-2
9:40 - 9:55
Crossing the river by feeling the stones
main-stage
AM-1
10:30 - 12:30
Track Introductions
Larch room
Time slot over-subscribed
Using maps to define how to capture, detect and prevent 6 real-world security incidents
Larch room
Time slot over-subscribed
Azure Security Features, Just a Few
Pedley room
Wardley Mapping – a practical session on how to use value chain mapping
Larch room
DS-2
12:30 - 13:30
Time slot over-subscribed
Creating a standard for GDPR patterns
Table 2
OWASP Collective Defence Cluster (CDC) - One year on
Table 3
A long successful career in IT (women in tech)
main-stage
PM-1
13:30 - 15:00
Time slot over-subscribed
Ask me anything (AMA) on GDPR
Agile Practices for Security Teams
Larch room
Using User Story Mapping for effective communication
Larch room
Time slot over-subscribed
Cell based Structures for Security
Larch room
Hands-on GDPR Patterns
Portland room
PM-2
15:30 - 16:30
Create Wardley Maps for multiple security scenarios
Larch room
How to Threat Model Features with Questionnaires
Kings room
Time slot over-subscribed
CISO Ask Me Anything (AMA)
Invited
SOC Value Chain using Wardley maps
Larch room
PM-3
16:30 - 17:30
Time slot over-subscribed
Cyber Risk Modeling
Portland room
Time slot over-subscribed
GDPR Appropriate Security Controls
Portland room
DS-3
18:00 - 19:00
GDPR Compliance what does it mean?
Table 1
Eve-2
21:00 - 23:00
Time slot over-subscribed
Using Threat Models for GDPR
317 - Photobox villa

Participating sessions details

TitleDescriptiontypeWhenTimeActing as
Using Threat Models for GDPRHands on user session on how to use Threat Models in GDPR mappingsuser-sessionTueEve-2participant
Agile Practices for Security TeamsAgile Practices for Security Teamsworking-sessionTuePM-1participant
GDPR Appropriate Security ControlsMap out what these are and what is the best way to measure themworking-sessionWedPM-3participant
Creating a standard for GDPR patternsWorking Session on reviewing and agreeing on a set of GDPR patternsworking-sessionTueDS-2participant
GDPR Compliance what does it mean?Now that GDPR is in force, what does GDPR Compliance mean and how to measure itworking-sessionMonDS-3participant
Cyber Risk ModelingSession on Risk Modelingworking-sessionTuePM-3participant
Getting more women in Cyber-security
OWASP Collective Defence Cluster (CDC) - One year onworking-sessionTueDS-2participant
Hands-on GDPR PatternsUsing GDPR Patternsuser-sessionThuPM-1participant
Using Threat Models for GDPRHands on user session on how to use Threat Models in GDPR mappingsuser-sessionTueEve-2participant
Ask me anything (AMA) on GDPRAsk all the burning questions you have on GDPRuser-sessionTuePM-1participant
Crossing the river by feeling the stonesKeynote by Simon Wardleyuser-sessionThuKN-2participant
A long successful career in IT (women in tech)Keynote by Ante Gulamuser-sessionTueDS-2participant
Cell based Structures for SecuritySpotify compliant organizational model in security domainworking-sessionThuPM-1participant
Create Wardley Maps for multiple security scenariosPractical session on creating [Wardley Maps]working-sessionMonPM-2participant
Using maps to define how to capture, detect and prevent 6 real-world security incidentsHands on session on how to use Wardley mapsworking-sessionTueAM-1participant
SOC Value Chain using Wardley mapsuser-sessionThuPM-2participant
Wardley Mapping – a practical session on how to use value chain mappingPractical session on how to use value chain mapping.user-sessionThuAM-1participant

Register as organizer

To register as an organizer of an session or track:

  • add your name to the organizers metadata field (in this case Tony Richards)


Back to list of all Participants