Jim Newman

Information Security Manager, Jaja Finance

Participant's team(s):

    Jim Newman Daily Schedule

    MondayTuesdayWednesdayThursdayFriday
    KN-1
    10:00 - 10:20
    Security Data Science
      main-stage
      AM-1
      10:30 - 12:30
      Agile Practices for Security Teams
      Larch room
      Security Challenges - Analyse others
      Towards a unified way of describing threat models
      Larch room
      Security Challenges - Next step
      Larch room
      PM-1
      13:30 - 15:00
      Creating Appsec metrics and visualisation
      Maulden room
      Secrets Management
      Maulden room
      PM-2
      15:30 - 16:30
      Lightweight privacy threat modeling using LINDDUN
      Larch room
      Using Wardley Maps and Cynefin for Security
      Portland room
      PM-3
      16:30 - 18:00
      Using Cynefin Framework making strategic security decisions
      Portland room

      Participating sessions details

      TitleDescriptiontypeWhenTimeActing as
      Security Challenges - Collate others' strategies and assumptionsCollate results from Wednesday.working-sessionparticipant
      Security Challenges - Next stepIs this viable? Where do we go?working-sessionFriAM-1participant
      Lightweight privacy threat modeling using LINDDUNLightweight privacy threat modeling using LINDDUNworking-sessionMonPM-2participant
      Towards a unified way of describing threat modelsA presentation and discussion of a new language to describe a threat modelworking-sessionThuAM-1participant
      Agile Practices for Security TeamsAgile Practices for Security Teamsworking-sessionTueAM-1participant
      Secrets ManagementSecrets Management in a DevSecOps worldworking-sessionWedPM-1participant
      Creating Appsec metrics and visualisationAppSec Metrics and Visualisationuser-sessionTuePM-1participant
      Security Data ScienceExpect Graphs, and Jypiter notebooks ...keynoteTueKN-1participant
      Security Challenges - Analysis, AnalogiesOutcomeparticipant
      Using Cynefin Framework making strategic security decisionsSession on how to use Cynefin Framework making strategic security decisionsworking-sessionWedPM-3participant
      Security Challenges - Analyse othersWhat strategies are already in use?working-sessionWedAM-1participant
      Using Wardley Maps and Cynefin for SecurityAn introduction to the Cynefin Framework, and its intersection with Wardley Maps, for Securityuser-sessionWedPM-2participant

      Register as organizer

      To register as an organizer of an session or track:

      • add your name to the organizers metadata field (in this case Jim Newman)


      Back to list of all Participants