Post-mortem of the incident exercise (2pm BST)

Register to watch this content

By submitting your email you agree to the terms
Watch this content now

Tracks covered by this session

About this session

[Check our youtube channel for the sessions you have missed (search security incident open security summit).] This is the last section of a four-part to exercise: Part 1 - Setting the scene to the further sessions. We will understand what is the company profile and the architecture of the company Threats and threat modeling of the company plus PNG (persona nan grata) profile Part 2 - We will run through the scenario with a small group of people who will get the roles of key stakeholders at the actual incident response session (which will be the next part) Part 3 - Actual exercise - 5 hours with breakout rooms for different groups of stakeholders. Run in sprints Information to be revealed throughout the exercise and groups work on their response Part 4 - THIS SESSION Post-mortem for the Part 3 what are the outcomes?

For more info of this session, please visit the session page at Post-mortem of the incident exercise

Have you got yours yet?

Our All-Access Passes are a must if you want to get the most out of this event.

Check them out

Dinis Cruz

CISO and SVP Engineering at Glasswall, Transformation agent, project leader of OWASP SBot and O2 Platform projects

Didar Gelici

I am a cyber risk manager transitioning into appsec/devsecops. I am CISSP and CIPP/US but believe the developer led future is already here and want to be here for them to integrate security in their practices rather than gatekeeping and dictating how they should do their job.

Tony Richards

Security Strategist, vCISO, Cloud Security Evangelist, Privacy Champion, Wardley Mapper. #Settler, #GdsTeam #GCloud #MoJ #CLAS #Veteran

Sponsor this Conference

Your logo could go here!

If you'd like to get your brand in front of attendees contact us.