Security Challenges - Next step

When:Fri AM-1
OrganizersNick Drage Nick Drage
ParticipantsJim Newman Jim Newman , Chris Dobson Chris Dobson , Florian Buetow Florian Buetow , Tom Ling Tom Ling

This is the latest version of this idea, partly inspired by a quick conversation with Dinis on Thursday evening.


Answers to the following questions, raised during the week:

  • Is the approach of finding similar industries or situations valid?

  • Does Dave Snowden’s experience support following or abandoning this methodology?

  • If it’s not valid, what methodologies should be used to create or find, and test, the correct strategies?

  • Can we learn from other practitioners in related areas as a useable “hack” to choose effective new strategies rapidly?

  • What are the underlying assumptions of the current strategies? Are those underlying assumptions valid?

  • Is this area of study financially or practically viable?




Register as participant

To register as participant add Security Challenges - Next step to either:

  1. the sessions metadata field from your participant's page (find your participant page and look for the edit link).
  2. or the participants metadata field from this git session page

Back to list of all Working Sessions