Security Challenges - Next step

Track:Misc
When:Fri AM-1
Where:Larch
OrganizersNick Drage Nick Drage
ParticipantsJim Newman Jim Newman , Chris Dobson Chris Dobson , Florian Buetow Florian Buetow , Tom Ling Tom Ling

This is the latest version of this idea, partly inspired by a quick conversation with Dinis on Thursday evening.

Outcomes

Answers to the following questions, raised during the week:

  • Is the approach of finding similar industries or situations valid?

  • Does Dave Snowden’s experience support following or abandoning this methodology?

  • If it’s not valid, what methodologies should be used to create or find, and test, the correct strategies?

  • Can we learn from other practitioners in related areas as a useable “hack” to choose effective new strategies rapidly?

  • What are the underlying assumptions of the current strategies? Are those underlying assumptions valid?

  • Is this area of study financially or practically viable?

References

TBD

Previous–>

Register as participant

To register as participant add Security Challenges - Next step to either:

  1. the sessions metadata field from your participant's page (find your participant page and look for the edit link).
  2. or the participants metadata field from this git session page


Back to list of all Working Sessions