Cyber and Security Enthusiast, UnderwriteMe
All James Bore's sessions
Title | Track | Year | Month |
---|---|---|---|
Beginners Threat Modeling | Threat Modeling | 2021 | Jun |
Incident Scenario Exercise | CISO and Risk Management | ||
Mentoring and it's challenges in Cyber Security | Governance | 2022 | Jul |
Playing at Security: Designing, building, and running tabletop scenarios for fail-safe incident handling and incident response training | Secure by Scenario | 2020 | Nov |
Refresher on Security Labels | Security Labels | 2020 | Nov |
Schrems II - Finding workable solutions | Schrems II | 2020 | Dec |
Schrems II - Finding workable solutions | Schrems II | 2021 | Jan |
Secure by Scenario | Secure by Scenario | 2020 | Oct |
Secure by Scenario | |||
Secure By Scenario | Secure By Scenario | 2021 | Jun |
Secure by Scenario - Data breach at the North Pole | Secure by Scenario | 2020 | Dec |
Security Labels & Schrems II | Security Labels | 2020 | Nov |
Threat Modeling - O365 SaaS Provider | Threat Modeling | ||
Threat Modeling for Schrems II | Threat Modeling | 2020 | Nov |
Threats categorization, pitfalls, different ways of applying it in practise | Threat Modeling | 2021 | Jan |
Back to list of all Participants