|Organizers||Nick Drage Nick Drage|
|Participants||Chris Dobson Chris Dobson , Florian Buetow Florian Buetow , Foteini Karantoni Foteini Karantoni , Jim Newman Jim Newman|
Having looked at some of the characteristics of the cyber security industry, we will now brainstorm on other industries or busineses or organisations or systems or situations that exhibit similar characteristics. What do specific charactertistics remind you of, what are the factors that determine whether you succeed or fail?
By looking at the challenges we face abstractly, away from the day to day docket of tasks that must simply be dealt with as quickly as possible, we can find better ways of preventing fires rather than always putting them out.
The emphasis for this session will be on simply identifying other situations worthy of further investigation.
The track organiser will have picked some of the outcomes from the session as a starting point, those that seem most promising for further investigation.
If there’s time the track organiser will describe what he means by an “underlying assumption”, to give participants something to think about over Wednesday, and possibly Thursday.
- A list of other industries or contexts that are worthy of further investigation.
Register as participant
To register as participant add
Security Challenges - Analysis, Analogies to either:
sessionsmetadata field from your participant's page (find your participant page and look for the edit link).
- or the
participantsmetadata field from this git session page
Back to list of all Working Sessions