Digital security for Women, Bosnia Gender and tech tutorials used
- Gender Tech Herstory Exhibition
- Gender Tech Personal Memories
- Hands On How the internet works
- Hands On Understanding the group – Spectrogram
- Holistic Security - Demonstrating the interconnectedness
- Holistic security - A day in your life
- Threat analysis - Information Mapping I
- Threat analysis - Information Mapping II