Cyber and Security Enthusiast, UnderwriteMe
All James Bore's sessions
| Title | Track | Year | Month |
|---|---|---|---|
| Beginners Threat Modeling | Threat Modeling | 2021 | Jun |
| Incident Scenario Exercise | CISO and Risk Management | ||
| Mentoring and it's challenges in Cyber Security | Governance | 2022 | Jul |
| Playing at Security: Designing, building, and running tabletop scenarios for fail-safe incident handling and incident response training | Secure by Scenario | 2020 | Nov |
| Refresher on Security Labels | Security Labels | 2020 | Nov |
| Schrems II - Finding workable solutions | Schrems II | 2020 | Dec |
| Schrems II - Finding workable solutions | Schrems II | 2021 | Jan |
| Secure by Scenario | Secure by Scenario | 2020 | Oct |
| Secure by Scenario | |||
| Secure By Scenario | Secure By Scenario | 2021 | Jun |
| Secure by Scenario - Data breach at the North Pole | Secure by Scenario | 2020 | Dec |
| Security Labels & Schrems II | Security Labels | 2020 | Nov |
| Threat Modeling - O365 SaaS Provider | Threat Modeling | ||
| Threat Modeling for Schrems II | Threat Modeling | 2020 | Nov |
| Threats categorization, pitfalls, different ways of applying it in practise | Threat Modeling | 2021 | Jan |
Back to list of all Participants