You do not have permission to edit this page, for the following reasons:
Please read before you start to fill in the form!
Please enter a basic description for the planned Self-Organized Session. For more information about Self-Organized Sessions head to Self-Organized Sessions.
Add times where you like to run your activities here by just pressing "Add another". You can add multiple times if you like to split your event over multiple timeslots. A Self-Organized Session should have at least one timeslot though ;)
Enter a full description of the event here. The field allows using the full mediawiki syntax for text formating.
Everyone makes digital security compromises. We sometimes reuse passwords, talk over unsecured channels, and open questionable files from strangers. Even security professionals make mistakes, because strong security tools and practices are sometimes challenging to use. In this discussion, we will share our experiences of our personal security compromises – and laugh at how absurdly easy it is to make them. We’ll talk about places where we know we take security shortcuts, and identify common challenges. While we will learn from one another about how we can improve our security habits, our primary goal will be to vent about our experiences. In the process, we can better understand how commonplace security compromises really are.
Summary:
This is a minor edit Watch this page
Cancel