Training: 8–9 November 2016
Tutorials & Conference: 9–11 November 2016
Amsterdam, NL

Tuesday, 8/11/2016

8:00

8:00–9:00 Tuesday, 8/11/2016
Location: 2D Foyer
Coffee break (1h)

9:00

Add to your personal schedule
9:00–17:00 Tuesday, 8/11/2016
Location: D203
Jay Jacobs (BitSight Technologies), Charles Givre (Orbital Insight)
Average rating: *****
(5.00, 1 rating)
Join Jay Jacobs, Charles Givre, and Bob Rudis, the authors of Data-Driven Security, for a hands-on, in-depth exploration into the foundations of security data science. You’ll learn how to explore and analyze data you probably already have and gain valuable exposure to and experience with tools and techniques to prepare, analyze, and visualize the knowledge hiding in your data. Read more.

10:30

10:30–11:00 Tuesday, 8/11/2016
Location: 2D Foyer
Morning break (30m)

12:30

12:30–13:30 Tuesday, 8/11/2016
Location: Ruby Lounge
Lunch (1h)

15:00

15:00–15:30 Tuesday, 8/11/2016
Location: 2D Foyer
Afternoon break (30m)

Wednesday, 9/11/2016

8:00

8:00–9:00 Wednesday, 9/11/2016
Location: Ruby/Topaz Lounges
Coffee break (1h)

9:00

Add to your personal schedule
9:00–12:30 Wednesday, 9/11/2016
Tech, tools, and processes
Location: E102 Level: Intermediate
Ben Hall (Katacoda | Ocelot Uproar)
Average rating: ****.
(4.00, 2 ratings)
Docker offers a lot of advantages, simplifying both development and production environments, but there is still uncertainty around the security of containers. Ben Hall shares his experiences while leading a hands-on demonstration of Docker and container security. Read more.
Add to your personal schedule
9:00–12:30 Wednesday, 9/11/2016
Security in context (security datasci)
Location: E104/106 Level: Intermediate
Marcelle Lee (Fractal Security Group, LLC), Lisa Foreman-Jiggetts (Women's Society of Cyberjutsu)
Average rating: ***..
(3.67, 3 ratings)
You don’t have to be a SOC analyst or an incident response guru to leverage network forensics. Marcelle Lee and Lisa Foreman-Jiggetts explore the wealth of information that can be learned through network traffic analysis. Read more.
Add to your personal schedule
9:00–12:30 Wednesday, 9/11/2016
Tech, tools, and processes
Location: E107 Level: Beginner
Mandi Walls (Chef)
InSpec is an open source runtime framework and rule language used to specify compliance, security, and policy requirements for testing any node in your infrastructure. Mandi Walls offers an introduction to the InSpec language and workflow, which takes the tediousness out of tracking security and compliance requirements for audits. Read more.

10:30

10:30–11:00 Wednesday, 9/11/2016
Location: Ruby/Topaz Lounges
Break (30m)

12:30

12:30–13:30 Wednesday, 9/11/2016
Location: Ruby/Topaz Lounges
Lunch (1h)

13:30

Add to your personal schedule
13:30–17:00 Wednesday, 9/11/2016
Tech, tools, and processes
Location: E102 Level: Beginner
Ido Safruti (PerimeterX), Ariel Sirota (PerimeterX)
Average rating: ***..
(3.50, 6 ratings)
Bots are a reality, and it’s hard to separate your users and good bots (e.g., search) from the bad ones (brute force, fraud, scrapers, etc.). Ido Safruti and Ariel Sirota review how bots work, explain how to operate a few common bots, and, most importantly, show what you can do to detect and block malicious activity while enabling your users and good bots to work uninterrupted. Read more.
Add to your personal schedule
13:30–17:00 Wednesday, 9/11/2016
Tech, tools, and processes
Location: E104/106 Level: Intermediate
Charles Givre (Orbital Insight)
Drill is an open source, schema-free SQL engine that can query all kinds of data. Applying Drill to network security problems potentially offers a leap forward in network analysis. Charles Givre demonstrates how to use Drill to query simple data, complex data, and data from databases and big data sources and walks you through writing your own functions to extend Drill's functionality. Read more.
Add to your personal schedule
13:30–17:00 Wednesday, 9/11/2016
Location: E107
Desiree Matel-Anderson (The Field Innovation Team)
Average rating: *****
(5.00, 1 rating)
You’ve been hacked. . .or are you doing the hacking? Join Desiree Matel-Anderson to solve a simulated hack in real time and put yourself in the shoes of a white hat defending essential data or a black hat fortifying your access to private data. Read more.

15:00

15:00–15:30 Wednesday, 9/11/2016
Location: Ruby/Topaz Lounges
Afternoon break (30m)

Thursday, 10/11/2016

8:00

8:00–9:00 Thursday, 10/11/2016
Location: Auditorium Foyer
Coffee break (1h)

9:00

Add to your personal schedule
9:00–9:05 Thursday, 10/11/2016
Location: Auditorium
Courtney W. Nash (O'Reilly), Allison Miller (Google)
Average rating: ****.
(4.67, 3 ratings)
Program chairs Courtney Nash and Allison Miller welcome you to the first day of keynotes. Read more.

9:05

Add to your personal schedule
9:05–9:35 Thursday, 10/11/2016
Location: Auditorium Level: Non-technical
Katie Moussouris (Luta Security)
Average rating: ****.
(4.67, 9 ratings)
Katie Moussouris, Founder & CEO, Luta Security Read more.

9:35

Add to your personal schedule
9:35–9:55 Thursday, 10/11/2016
Location: Auditorium
Phil Stanhope (Dyn )
Average rating: ****.
(4.11, 9 ratings)
Dyn was recently the subject of a major DDoS attack, its first significant disruption in over 15 years of operation. Phil Stanhope shares Dyn's experience before exploring the rapid evolution of multilayer attacks happening on the Internet and outlining the steps to take to deal with them from an ops perspective. Read more.

9:55

Add to your personal schedule
9:55–10:00 Thursday, 10/11/2016
Location: Auditorium
Matthew Carroll (Immuta Inc)
Average rating: ***..
(3.86, 7 ratings)
Algorithms influence our everyday decision making, but at what point does innovation turn into invasion? Matthew Carroll discusses how regulators and consumers can take back control by inserting legal checks and balances into the data science process. Read more.

10:00

Add to your personal schedule
10:00–10:30 Thursday, 10/11/2016
Location: Auditorium
Dan Kaminsky (White Ops)
Average rating: ****.
(4.64, 11 ratings)
Defensive technology that is not practical will not be deployed and will defend nothing at all. Dan Kaminsky discusses how a strong focus on ease of use—for developers, operators, and users—is our only hope for migrating to a more secure Internet. Read more.

10:30

Add to your personal schedule
10:30–10:35 Thursday, 10/11/2016
Location: Auditorium
Courtney W. Nash (O'Reilly), Allison Miller (Google)
Average rating: ****.
(4.50, 2 ratings)
Program chairs Courtney Nash and Allison Miller provide closing remarks for the first day of keynotes. Read more.

10:40

10:40–11:20 Thursday, 10/11/2016
Location: Elicium Sponsor Pavilion
Coffee Break (40m)

11:20

Add to your personal schedule
11:20–12:00 Thursday, 10/11/2016
Tech, tools, and processes
Location: G103 Level: Intermediate
Nick Sullivan (CloudFlare)
Average rating: ****.
(4.75, 4 ratings)
Bootstrapping the identity of services deployed with Docker containers is hard. Nick Sullivan offers an overview of an open source tool called PAL CloudFlare built to help solve this problem and explains how PAL can be used to bolster the security of your Docker container deployments. Read more.
Add to your personal schedule
11:20–12:00 Thursday, 10/11/2016
Security in context (security datasci)
Location: G104/105 Level: Intermediate
Alex Pinto (Niddel)
Average rating: ****.
(4.29, 7 ratings)
Alex Pinto demonstrates how to apply descriptive statistics, graph theory, and nonlinear scoring techniques on the relationships of known network IOCs to log data and how to use those techniques to empower IR teams to encode analyst intuition into repeatable data techniques that can be used to simplify the triage stage and get actionable information with minimal human interaction. Read more.
Add to your personal schedule
11:20–12:00 Thursday, 10/11/2016
Bridging business and security
Location: G106/107 Level: Beginner
Emily Schechter (Google)
Average rating: ****.
(4.20, 5 ratings)
HTTPS is no longer only for sensitive sites; it’s a critical piece of the web user experience and necessary for the long-term health of the Web. Google is methodically hunting and tackling major hurdles for TLS adoption to guide the Web toward HTTPS everywhere. Emily Schechter shares lessons learned on the road to ubiquitous HTTPS, focusing on the benefits of HTTPS. Read more.
Add to your personal schedule
11:20–12:00 Thursday, 10/11/2016
The human element
Location: G102 Level: Non-technical
Guy Podjarny (Snyk)
Average rating: *****
(5.00, 2 ratings)
From Heartbleed to ImageTragick, vulnerabilities in open source are repeatedly shaking the Web. But who is responsible for fixing these issues? OSS is a community feat, and so must securing it be. Guy Podjarny discusses the roles for authors, consumers, and tools in keeping open source secure. Read more.

12:00

Add to your personal schedule
12:00–13:15 Thursday, 10/11/2016
Location: Elicium Sponsor Pavilion
Average rating: **...
(2.00, 1 rating)
During lunch, you'll have the chance to participate in a Birds of a Feather session with like-minded people. Read more.

13:15

Add to your personal schedule
13:15–13:55 Thursday, 10/11/2016
Tech, tools, and processes
Location: G103 Level: Beginner
Quentin Machu (CoreOS)
Average rating: ****.
(4.33, 3 ratings)
Clair is an open source container image security analyzer that enables developers to build services that scan containers for security threats and vulnerabilities. Quentin Machu offers an overview of Clair and explores a real-life example to demonstrate how Clair is able to automatically detect known vulnerabilities in Docker and rkt containers before they get exploited. Read more.
Add to your personal schedule
13:15–13:55 Thursday, 10/11/2016
Security in context (security datasci)
Location: G104/105 Level: Intermediate
Hunter King (Google), August Huber (Google)
Average rating: ****.
(4.33, 3 ratings)
Hunter King and August Huber explain how to implement machine identity at scale in a heterogeneous environment. Discover the pitfalls of endpoint attestation. Hunter and August made the mistakes so you won't have to. Read more.
Add to your personal schedule
13:15–13:55 Thursday, 10/11/2016
Trey Darley (Kingfisher Operations, sprl)
Average rating: *....
(1.00, 2 ratings)
Trey Darley cuts through the hype surrounding threat intelligence and reframes the concept within a broader historical context, showing how information sharing can be a effective tool for both organizations with sophisticated security programs and organizations falling below the security poverty line. Read more.
Add to your personal schedule
13:15–13:55 Thursday, 10/11/2016
The human element
Location: G102 Level: Non-technical
Average rating: ****.
(4.50, 2 ratings)
Why do certain devices, programs, or companies lead to utter frustration while others consistently delight us? What can we learn from these insights when dealing with human behavior related to security? Jelle Niemantsverdriet explores user-centered design methods in other disciplines like economy, psychology and marketing that can help us build security in a truly usable way. Read more.

14:10

Add to your personal schedule
14:10–14:50 Thursday, 10/11/2016
Tech, tools, and processes
Location: G103 Level: Beginner
Ernest Kim (MITRE Corp.)
Average rating: ***..
(3.00, 2 ratings)
Ernest Kim shares how the MITRE Corporation, a US federally funded research and development center, integrated security tools into its DevOps chain to get continuous insight into the security posture of the various Linux distributions it uses and rapidly deploy fixes when needed. Read more.
Add to your personal schedule
14:10–14:50 Thursday, 10/11/2016
Security in context (security datasci)
Location: G104/105 Level: Intermediate
Merike Kaeo (Farsight Security)
Average rating: ****.
(4.40, 5 ratings)
Nothing good or bad can happen on the Internet without involving the Domain Name System (DNS), which provides visibility of the global Internet and unparalleled intelligence on cybercriminals and attack methods. Merike Käo discusses the value of DNS to cyber investigations and explores how real-time DNS observations can improve accuracy and response time to cyberattacks. Read more.
Add to your personal schedule
14:10–14:50 Thursday, 10/11/2016
Bridging business and security
Location: G106/107 Level: Intermediate
Stein Inge Morisbak (Bekk Consulting AS), Erlend Oftedal (Blank Oslo)
Average rating: ***..
(3.50, 2 ratings)
In a world of continuous everything, each discipline has to find ways to provide value fast and reliably—whether it's business people adapting to an ever-changing world, developers delivering software many times per day, or operations providing high-availability infrastructure in an instant. Stein Inge Morisbak and Erlend Oftedal explore how to integrate security into this work stream. Read more.
Add to your personal schedule
14:10–14:50 Thursday, 10/11/2016
The human element
Location: G102 Level: Non-technical
Kyle Rankin (Final, Inc.)
Average rating: ****.
(4.33, 3 ratings)
Capture the Flag tournaments have long been used to test hacker skills, but they can also serve as effective security training for developers. Kyle Rankin shares a case study where he turned teams of developers with no prior security training against each other in a CTF arena featuring their own applications and watched them rack up points as they popped shells in each other's applications. Read more.

14:50

14:50–15:50 Thursday, 10/11/2016
Location: Elicium Sponsor Pavilion
Afternoon Break (1h)

15:50

Add to your personal schedule
15:50–16:30 Thursday, 10/11/2016
Tech, tools, and processes
Location: G103 Level: Intermediate
Jonathan Clarke (Normation)
Average rating: ****.
(4.67, 3 ratings)
Rudder is an open source IT compliance automation tool that focuses on continuously checking configurations to provide a real-time high-level compliance status or break down noncompliance issues to a deep technical level. Jonathan Clarke offers an overview of Rudder and demonstrates how to use it to drill down to any issues that need remediating. Read more.
Add to your personal schedule
15:50–16:30 Thursday, 10/11/2016
Security in context (security datasci)
Location: G104/105 Level: Beginner
Steve Touw (Immuta)
Average rating: ***..
(3.50, 2 ratings)
The global populace is asking for the IT industry to be held responsible for the safe-guarding of individual data. If the cat is out of the bag and collection will not stop, then the next logical question is how do we protect the privacy of individuals? Steven Touw examines how to design your data and analytics architecture to keep your data science teams delivering results legally. Read more.
Add to your personal schedule
15:50–16:30 Thursday, 10/11/2016
Bridging business and security
Location: G106/107 Level: Intermediate
Stephen de Vries (ContinuumSecurity)
Average rating: *****
(5.00, 2 ratings)
Current approaches to threat modeling emphasize manual analysis by trained teams, which can result in a bottleneck in the development process, reducing the appeal of performing this activity. Stephen de Vries presents a technique that uses reusable risk patterns to open the door to automated and scalable threat modeling. Read more.
Add to your personal schedule
15:50–16:30 Thursday, 10/11/2016
The human element
Location: G102 Level: Non-technical
Brendan O'Connor (Malice Afterthought, Inc.)
Average rating: ****.
(4.00, 3 ratings)
Security people are "only members of the public who are paid to give full-time attention to duties which are incumbent on every citizen in the intent of the community welfare," but often the relationship between security and everyone else is fraught. Brendan O'Connor explores how another group charged with protecting everyone handled this problem with humor, kindness, and a commitment to service. Read more.

16:45

Add to your personal schedule
16:45–17:25 Thursday, 10/11/2016
The human element
Location: G103
Dan Kaminsky (White Ops)
Average rating: *****
(5.00, 4 ratings)
Hacking is a game, and defense both makes the rules and is under no particular obligation to play fair. So cheat. Dan Kaminsky explores better ways to deploy cryptography, protect data, leverage clouds, and more. Read more.
Add to your personal schedule
16:45–17:25 Thursday, 10/11/2016
Location: G104/105
Masha Sedova (Salesforce)
Average rating: ****.
(4.67, 3 ratings)
Masha Sedova shares the steps she’s taken to increase the reporting of suspicious activity by her employees and explores the measurable impact it has had in helping keep Salesforce’s employees and customers secure. Read more.
Add to your personal schedule
16:45–17:25 Thursday, 10/11/2016
Bridging business and security
Location: G106/107 Level: Non-technical
Jessy Irwin (Jessysaurusrex)
Average rating: ****.
(4.33, 3 ratings)
It happens to every security team: after explaining operational security to management, it feels like nothing stuck. Why do eyes glaze over when we talk about encryption? How can we make sense of defense in depth for others? Jessy Irwin shows you how to find common ground and truly share security with nontechnical users, helping better communicate the mindset behind security. Read more.
Add to your personal schedule
16:45–17:25 Thursday, 10/11/2016
Tech, tools, and processes
Location: G102 Level: Beginner
Ido Safruti (PerimeterX), Tomer Cohen (Wix.com)
Average rating: *****
(5.00, 6 ratings)
Using social logins is a good way to boost security. However, this often makes site owners complacent, skipping security measures they still need to maintain. Ido Safruti and Tomer Cohen explain how attackers have found ways to exploit this and bypass the auth providers’ defenses, attacking some of the world’s largest services, and demonstrate how to protect yourself from such attacks. Read more.

17:30

Add to your personal schedule
17:30–18:30 Thursday, 10/11/2016
Location: Elicium Sponsor Pavilion
Be sure to join us in the Sponsor Pavilion for drinks and food for the Attendee Reception. This will be your first opportunity to network with other Security attendees, so don’t miss out. Read more.

Friday, 11/11/2016

8:00

8:00–9:00 Friday, 11/11/2016
Location: Auditorium Foyer
Coffee Break (1h)

9:00

Add to your personal schedule
9:00–9:05 Friday, 11/11/2016
Location: Auditorium
Courtney W. Nash (O'Reilly), Allison Miller (Google)
Average rating: ****.
(4.67, 3 ratings)
Program chairs Courtney Nash and Allison Miller welcome you to the final day of keynotes. Read more.

9:05

Add to your personal schedule
9:05–9:35 Friday, 11/11/2016
Location: Auditorium
Thomas Dullien (Google)
Average rating: ****.
(4.88, 8 ratings)
Thomas Dullien explores how our software and hardware stacks could be rearchitected to allow reliable detection of compromise and outlines a number of different technologies that are needed for this, including reproducible builds, public ledgers like certificate transparency, and hardware with nonupdateable checksumming that is user inspectable. Read more.

9:35

Add to your personal schedule
9:35–10:00 Friday, 11/11/2016
Location: Auditorium
Marie Moe (SINTEF)
Average rating: ****.
(4.78, 9 ratings)
Marie Moe discusses medical device security and privacy, focusing on connected medical devices like implanted cardiac devices with remote monitoring functionality. Read more.

10:00

Add to your personal schedule
10:00–10:30 Friday, 11/11/2016
Location: Auditorium
Benjamin Buchanan (Harvard University)
Average rating: ***..
(3.29, 7 ratings)
Who did it? Attributing computer network intrusions is commonly seen as one of the most intractable technical problems, solvable (or not) depending mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? Ben Buchanan shows that attribution is what companies—and governments—make of it. Read more.

10:30

Add to your personal schedule
10:30–10:35 Friday, 11/11/2016
Location: Auditorium
Courtney W. Nash (O'Reilly), Allison Miller (Google)
Average rating: *****
(5.00, 1 rating)
Program chairs Courtney Nash and Allison Miller provide closing remarks for the second day of keynotes. Read more.

10:40

10:40–11:20 Friday, 11/11/2016
Location: Elicium Sponsor Pavilion
Morning Break (40m)

11:20

Add to your personal schedule
11:20–12:00 Friday, 11/11/2016
Tech, tools, and processes
Location: G103 Level: Intermediate
Dan Amiga (Fireglass), Dor Knafo (Fireglass)
Average rating: *****
(5.00, 3 ratings)
Your engineering team is using AWS for deploying applications, storing data, hybrid networking, and many other services, but what does it mean for IT security? Dan Amiga and Dor Knafoa offer a technical, hands-on overview of how engineering is using AWS and outline the missing security pieces that should be put in place. Read more.
Add to your personal schedule
11:20–12:00 Friday, 11/11/2016
Tech, tools, and processes
Location: G104/105 Level: Intermediate
Ryan Huber (Slack Technologies, Inc), Nate Brown (Slack Technologies, Inc)
Average rating: ***..
(3.67, 6 ratings)
How should an organization approach monitoring networks and hosts to make informed security decisions? Ryan Huber and Nate Brown discuss useful examples of how security and operations teams can become more effective by scaling their visibility into large distributed networks using tools like kernel auditing and large-scale log processing with Elasticsearch and ElastAlert. Read more.
Add to your personal schedule
11:20–12:00 Friday, 11/11/2016
Bridging business and security
Location: G106/107 Level: Non-technical
Chiara Rustici (Independent)
Average rating: ***..
(3.00, 2 ratings)
Security teams fought hard to get board attention and budget. Often they own the privacy/GDPR brief too, allocated to them as an afterthought. Chiara Rustici explains why it is impossible for GDPR implementation to go ahead unless the board has given a clear data business model and helps escalate the personal data cost/benefit equation to the C-suite. Read more.
Add to your personal schedule
11:20–12:00 Friday, 11/11/2016
Security in context (security datasci)
Location: G102 Level: Beginner
Noé Lutz (Google Inc.)
Average rating: ****.
(4.80, 5 ratings)
Developers face significant challenges defending their platforms from attackers who try to co-opt platforms to distribute attacks on users. Noé Lutz discusses lessons learned over the past decade by the Google Safe Browsing (GSB) team about how to thwart these increasingly sophisticated threats, focusing on how developers can leverage GSB’s open source APIs to protect their users. Read more.

12:00

Add to your personal schedule
12:00–13:15 Friday, 11/11/2016
Location: Elicium Sponsor Pavilion
Average rating: *****
(5.00, 2 ratings)
During lunch, you'll have the chance to participate in a Birds of a Feather session with like-minded people. Read more.

13:15

Add to your personal schedule
13:15–13:55 Friday, 11/11/2016
Tech, tools, and processes
Location: G103 Level: Intermediate
James Baker (LinkedIn), Mira Thambireddy (LinkedIn)
Average rating: ****.
(4.25, 4 ratings)
As traffic to websites and web applications increases, infrastructure must be put in place to handle scaling—but with that comes an increased risk for security breaches. James Baker and Mira Thambireddy dive into specific client-side vulnerabilities, discussing design patterns that scale an application securely and which frameworks currently in the market already employ these practices. Read more.
Add to your personal schedule
13:15–13:55 Friday, 11/11/2016
Security in context (security datasci)
Location: G104/105 Level: Intermediate
Alexandre Dulaunoy (CIRCL (The Computer Incident Response Center Luxembourg))
Average rating: ****.
(4.33, 3 ratings)
Information sharing is a key element in detecting security breaches and proactively protecting information systems and infrastructures, but the practical aspect is often forgotten. Alexandre Dulaunoy offers an overview of MISP, a free software tool that supports information-sharing practices among communities, and shares some lessons learned while building it. Read more.
Add to your personal schedule
13:15–13:55 Friday, 11/11/2016
Bridging business and security
Location: G106/107 Level: Intermediate
Wayne Anderson (Avanade)
Global business offerings face a more complex regulatory environment than ever before. Wayne Anderson shares lessons learned from a multiyear program build to translate regulations and compliance obligations into practical security controls. Read more.
Add to your personal schedule
13:15–13:55 Friday, 11/11/2016
The human element
Location: G102 Level: Non-technical
Katrin Anna Ruecker (Facebook )
Average rating: ****.
(4.50, 4 ratings)
Katrin Anna Ruecker explains how Facebook's privacy managers work with product teams to build products with privacy in mind. Join Anna to learn about the privacy review process and how Facebook designs privacy controls and user education. Read more.

14:10

Add to your personal schedule
14:10–14:50 Friday, 11/11/2016
Tech, tools, and processes
Location: G103 Level: Intermediate
Brian Sletten (Bosatsu Consulting)
Average rating: *****
(5.00, 1 rating)
Brian Sletten introduces Google Macaroons, a fine-grained, decentralized authorization mechanism that is web friendly and suitable for cloud and microservices. Read more.
Add to your personal schedule
14:10–14:50 Friday, 11/11/2016
Security in context (security datasci)
Location: G104/105 Level: Intermediate
Eddie Garcia (Cloudera)
Average rating: ***..
(3.67, 3 ratings)
The use of big data and machine learning to detect and predict security threats is a growing trend, with interest from financial institutions, telecommunications providers, healthcare companies, and governments alike. But is this technology all hype or real? Eddie Garcia explores how companies use Hadoop-based solutions to protect their organizations. Read more.
Add to your personal schedule
14:10–14:50 Friday, 11/11/2016
Bridging business and security
Location: G106/107 Level: Intermediate
Dan Amiga (Fireglass), Dor Knafo (Fireglass)
Average rating: ***..
(3.50, 4 ratings)
Isolation is a new approach to security that is gaining momentum across many industries. Dan Amiga and Dor Knafo cover the important things you need to know about isolation: why now, how isolation can improve productivity, detection versus isolation, technologies, different approaches, caveats, evaluation criteria, live demos, and deployment strategies into the existing IT security environment. Read more.
Add to your personal schedule
14:10–14:50 Friday, 11/11/2016
The human element
Location: G102 Level: Intermediate
James Plouffe (MobileIron)
Average rating: ****.
(4.00, 1 rating)
We keep our whole lives on our mobile devices. If we use our personal devices for work, we have still more sensitive information in the form of company data. Many employees are concerned about what personal information is visible to their employers. James Plouffe explores whether it's possible to secure corporate data and respect privacy. Read more.

14:50

14:50–15:50 Friday, 11/11/2016
Location: Elicium Sponsor Pavilion
Afternoon Break (1h)

15:50

Add to your personal schedule
15:50–16:30 Friday, 11/11/2016
Tech, tools, and processes
Location: G103 Level: Intermediate
Pat Parseghian (Google)
Average rating: *****
(5.00, 1 rating)
Do you know what’s connected to your network? While 802.1X is commonly used to authenticate connections to wireless networks, successfully applying the same technology to your wired infrastructure is far from straightforward. Pat Parseghian shares the story of what a small, determined team did to make wired 802.1X a reality on Google’s enterprise network. Read more.
Add to your personal schedule
15:50–16:30 Friday, 11/11/2016
Tech, tools, and processes
Location: G104/105 Level: Intermediate
Richard Freytag (Freytag & Company, LLC)
Average rating: *****
(5.00, 1 rating)
Tests of pseudo-random number generator (PRNG) performance use deterministic analysis to expose weaknesses, which new PRNGs are designed to satisfy. Modern supervised learning algorithms offer an improved method to test PRNG performance. Richard Freytag offers a short, concrete, and intuitive exploration of how to apply machine learning as a black box in pseudo-random number generators. Read more.
Add to your personal schedule
15:50–16:30 Friday, 11/11/2016
Bridging business and security
Location: G106/107 Level: Beginner
Don Bailey (Lab Mouse Security)
Average rating: *....
(1.00, 3 ratings)
We're all sick of hearing it. Day after day, another "junk hack" pops up in the news. The stories are tiring and repetitive, but what is a blue team to do? Don Bailey explains that defense in the IoT is less about the technology and more about the process of deploying, monitoring, and maintaining technology. With a well-defined set of processes, we can antiquate the concept of junk hacking. Read more.
Add to your personal schedule
15:50–16:30 Friday, 11/11/2016
The human element
Location: G102 Level: Beginner
Jennifer Martin (Covington & Burling)
Average rating: *****
(5.00, 2 ratings)
The single most important element to successful cybersecurity incident response is developing a holistic, cross-functional incident response process. Jennifer Martin provides guidance for building trust and educating stakeholders on each others' priorities, roles, and responsibilities to mitigate against internal confusion and strife during a crisis. Read more.

16:45

Add to your personal schedule
16:45–17:25 Friday, 11/11/2016
Tech, tools, and processes
Location: G103 Level: Intermediate
Zane Lackey (Signal Sciences)
Average rating: ****.
(4.00, 1 rating)
The SDLC has been the model for web application security over the last decade. However, the SDLC was originally designed in a waterfall world and often causes more problems than it solves in the shift to Agile, DevOps, and CI/CD. Zane Lackey shares actionable tips on the most effective application security techniques in today's increasingly rapid environment of application creation and delivery. Read more.
Add to your personal schedule
16:45–17:25 Friday, 11/11/2016
Bridging business and security
Location: G104/105 Level: Intermediate
Shannon Yavorsky (Kirkland & Ellis LLP)
Average rating: ****.
(4.00, 1 rating)
The failure of a target company to comply with applicable privacy and data security legislation, regulations, and standards can present a significant risk to the acquiring company. Shannon Yavorsky explains why understanding a target’s data privacy and data security profile has become a critical consideration in M&A transactions. Read more.
Add to your personal schedule
16:45–17:25 Friday, 11/11/2016
Bridging business and security
Location: G106/107 Level: Non-technical
Nav Jagpal (Google)
Average rating: ****.
(4.00, 3 ratings)
Google’s Safe Browsing team obtains an outsider’s perspective of their systems by engaging with a spectrum of adversaries and allies. Nav Jagpal shares a combination of fun stories and lessons learned and offers recommendations on how to design systems and develop policies to deal with spectrums of behavior. Read more.
Add to your personal schedule
16:45–17:25 Friday, 11/11/2016
The human element
Location: G102 Level: Intermediate
Average rating: *****
(5.00, 1 rating)
Frederic Branczyk offers an overview of rkt, a container runtime engine developed by CoreOS that was designed for security. rkt can run the same container with varying degrees of protection, from lightweight, OS-level namespace and capabilities isolation to heavier, VM-level hardware virtualization. Read more.