Risk and Governance - go to homepage
Toggle Navigation
Search
Projects
Schedule
Members
Past Summits
Apr 2023
Feb 2023
Dec 2022
Sep 2022
Jul 2022
May 2022
Mar 2022
Jan 2022
Nov 2021
Sep 2021
Jun 2021
May 2021
Apr 2021
Mar 2021
Jan 2021
Dec 2020
Nov 2020
Oct 2020
Future Summits
Jun 2023
Aug 2023
Oct 2023
About
The Summit
Faq
Sponsors
Project
Risk and Governance
Project focused on multiple Risk and Governance topics
Highlight Videos
Project Sessions
Title
Track
Year
Month
“Shift Left” Isn’t What You Expected
Risk and Governance
2023
Apr
Are our users always smarter than AI?
Risk and Governance
2023
Jun
Behaviour Change and Awareness
Risk and Governance
2023
Apr
Cybersecurity assessments: finding the way forward
Risk and Governance
2023
Apr
In the moment nudges – What? How? Applying nudge theory to awareness
Risk and Governance
2023
Jun
Panel - Prioritizing Risks and Vulnerabilities based on Context
Risk and Governance
2021
Nov
Risk Acceptance and OISRU (Panel)
Risk and Governance
2023
Jun
The Truth about suffering a cyber-attack
Risk and Governance
2023
Apr
Using Jira to Map and Visualise Risks
Risk and Governance
2021
Nov
A Cyber Security Roadmap: How To?
Governance
2022
May
A perspective on automating 3rd party risk assessment. How to free up your staff, and improve speed by automaton with guardrails.
Governance
2021
Apr
Adversary Simulation: Close the Gaps in Your Security Posture
Governance
2022
May
AMA with Adam Shostack
Threat Modeling
2022
Jul
AMA with Alyssa Miller
Education
2022
Dec
AMA with Brook Schoenfield
Governance
2022
Mar
AMA with Gary McGraw
Governance
2022
Sep
AMA with Mark Curphey
Governance
2022
Sep
An Interactive Session on Teamwork and Collaboration Tools
Governance
2023
Feb
Automating SOC2 using Jira
Governance
2021
Jan
Bridging the skill gap and hiring challenges in cyber
Governance
2022
Jul
Build state of the art SOC with Mitre Attack
Governance
2022
Mar
Building Security Champions
Governance
2022
Mar
CDC - Collective Defence Clusters
Governance
2022
May
Challenges in IoT security: from infinite recommendations to a plethora of implementations
Governance
2021
Jun
CISO Role in 2023 (Panel)
Governance
2023
Feb
CISO Roundtable - Mar 2022
Governance
2022
Mar
Content Delivery & Security Association
Governance
2021
Sep
Crowdsourcing Security Talent
Governance
2022
Dec
CVE CWE CVSS CWSS where do I look first?
Governance
2021
Nov
Cyber Insurance
Governance
2022
Sep
Cyber Insurance - a deeper approach
Governance
2022
Dec
Data Integrity and Information Integrity-they are enterprise not just CISO issues
Governance
2022
Dec
Demystifying Risk and the Future of Vulnerability Management
Governance
2022
Dec
Dependency Management and Supply Chain Security
Governance
2022
May
Developer Driven Security in high-growth environments
Governance
2023
Feb
Encrypted Calendars - the need and consequences
Governance
2020
Dec
Graph Based Vulnerability Management
Governance
2021
Apr
Hiring manager insights to secure your next security role/team member
Governance
2022
Sep
How do male and female voices project authority in Cyber
Governance
2022
Jul
How to overcome DNS security threats
Governance
2022
May
Ideas for Graph DBs like Neo4j
Governance
2022
Mar
Jira Schemas and Workflows for AppSec and Risk Management
Governance
2022
Jan
Mentoring and it's challenges in Cyber Security
Governance
2022
Jul
Modern Office Spaces
Governance
2021
Apr
OISRU - Open Information Security Risk Universe (Panel)
Governance
2023
Feb
Practical approach/considerations to developing a cybersecurity program
Governance
2022
Dec
Predicting the rise and fall of an open source project
Governance
2022
Jan
Product Permissions - Common Pitfalls and How Not to Fall For Them
Governance
2022
Jul
Protecting Critical Data, through the implementation of Information Security Management System to meet compliance
Governance
2022
Jul
Quantifying Usability In Security Designs and Risk Assessments
Governance
2022
Dec
Reciprocity: Tales of an Anthropologist in Cybersecurity
Governance
2021
Jun
Resilience Engineering, Safety Science and Systems thinking - new tools for the complex world
Governance
2022
Jul
Risk treatment planning in modern tech space (Panel)
Governance
2023
Apr
Rules & Recommendations: Are we pushing our new IoT device out correctly?
Governance
2021
Jun
Security business enabler: How to align your security program to business goals
Governance
2022
Dec
Security Champions - Sharing Experiences
Governance
2022
May
Security Design & Guidance at scale
Governance
2023
Feb
Security on autonomous systems - a long way to go
Governance
2022
Mar
SOC2 Certification for SaaS companies
Governance
2020
Dec
Successes and Failures at Security Training
Governance
2022
Sep
Technical Leadership and Influence
Governance
2022
Jan
The Business case for Security Champions
Governance
2022
Mar
The challenge of auditing smart contract audit, especially ones with more advanced cryptographic primitives such as ZKP or MPC
Governance
2022
Jul
The Challenges With DNS Security
Governance
2022
Feb
The Human Firewall
Governance
2022
May
The next Insider Threat isn't your staff!
Governance
2022
May
The RATs and CATs of Risk - Graph based Risk Framework
Governance
2021
Apr
The value of CTO/CISOs and how to make it work
Governance
2022
Jul
Using Presentations instead of CVs and Creating Diverse Security Teams
Governance
2022
Mar
Vendor Security Management using Jira
Governance
2021
Jun
We need second-order thinking in security
Governance
2022
Dec
Web application's language negotiation in 2023
Governance
2023
Jun
What to do in preparation for a Threat Model
Governance
2021
May
Women in Cyber Security: Personal experiences and how to be an Ally
Governance
2022
Dec
Women kick off in Cybersecurity
Governance
2023
Apr
Sponsored by
Become a sponsor
Active Members
Alan Jenkins
Dinis Cruz
Avi Douglen
Aaron Rinehart
Didar Gelici
Back to list of Projects