Track: | Misc |
---|---|
When: | Tue PM-3 |
Where: | Portland |
Organizers | Nick Drage Nick Drage |
Participants | Chris Dobson Chris Dobson , Florian Buetow Florian Buetow , Foteini Karantoni Foteini Karantoni , Jim Newman Jim Newman |
Having looked at some of the characteristics of the cyber security industry, we will now brainstorm on other industries or busineses or organisations or systems or situations that exhibit similar characteristics. What do specific charactertistics remind you of, what are the factors that determine whether you succeed or fail?
WHY
By looking at the challenges we face abstractly, away from the day to day docket of tasks that must simply be dealt with as quickly as possible, we can find better ways of preventing fires rather than always putting them out.
The emphasis for this session will be on simply identifying other situations worthy of further investigation.
What
The track organiser will have picked some of the outcomes from the session as a starting point, those that seem most promising for further investigation.
If there’s time the track organiser will describe what he means by an “underlying assumption”, to give participants something to think about over Wednesday, and possibly Thursday.
Outcomes
- A list of other industries or contexts that are worthy of further investigation.
References
TBD
Previous–>
Register as participant
To register as participant add Security Challenges - Analysis, Analogies
to either:
- the
sessions
metadata field from your participant's page (find your participant page and look for the edit link). - or the
participants
metadata field from this git session page
Back to list of all Working Sessions