Training: 8–9 November 2016
Tutorials & Conference: 9–11 November 2016
Amsterdam, NL
Dan Amiga

Dan Amiga
Cofounder and CTO, Fireglass

Website

Dan Amiga is the cofounder and CTO of FireGlass, a cybersecurity startup that commercializes military-grade network security concepts into paradigm shifting enterprise security products. Dan has spent years doing IT security in the IDF Intelligence, where he was focused on inventing and developing new security solutions that go far beyond firewalls, proxies, or heuristic-based antimalware solutions. After moving to the private sector, Amiga has worked for the Microsoft Technology Center as a senior consultant for highly secure organizations, governments, and critical infrastructure companies. He then moved to the energy giant Schneider Electric, where he held the position of chief software architect. Dan has given talks at major international security and software conferences and is an adjunct professor at the Interdisciplinary Center, Israel, where he teaches advanced cloud computing topics.

Sessions

11:20–12:00 Friday, 11 November, 2016
Tech, tools, and processes
Location: G103 Level: Intermediate
Dan Amiga (Fireglass), Dor Knafo (Fireglass)
Average rating: *****
(5.00, 3 ratings)
Your engineering team is using AWS for deploying applications, storing data, hybrid networking, and many other services, but what does it mean for IT security? Dan Amiga and Dor Knafoa offer a technical, hands-on overview of how engineering is using AWS and outline the missing security pieces that should be put in place. Read more.
14:10–14:50 Friday, 11 November, 2016
Bridging business and security
Location: G106/107 Level: Intermediate
Dan Amiga (Fireglass), Dor Knafo (Fireglass)
Average rating: ***..
(3.50, 4 ratings)
Isolation is a new approach to security that is gaining momentum across many industries. Dan Amiga and Dor Knafo cover the important things you need to know about isolation: why now, how isolation can improve productivity, detection versus isolation, technologies, different approaches, caveats, evaluation criteria, live demos, and deployment strategies into the existing IT security environment. Read more.