Training: 8–9 November 2016
Tutorials & Conference: 9–11 November 2016
Amsterdam, NL

Schedule: Tech, tools, and processes sessions

Add to your personal schedule
9:00–12:30 Wednesday, 9 November, 2016
Location: E102 Level: Intermediate
Ben Hall (Katacoda | Ocelot Uproar)
Average rating: ****.
(4.00, 2 ratings)
Docker offers a lot of advantages, simplifying both development and production environments, but there is still uncertainty around the security of containers. Ben Hall shares his experiences while leading a hands-on demonstration of Docker and container security. Read more.
Add to your personal schedule
9:00–12:30 Wednesday, 9 November, 2016
Location: E107 Level: Beginner
Mandi Walls (Chef)
InSpec is an open source runtime framework and rule language used to specify compliance, security, and policy requirements for testing any node in your infrastructure. Mandi Walls offers an introduction to the InSpec language and workflow, which takes the tediousness out of tracking security and compliance requirements for audits. Read more.
Add to your personal schedule
13:30–17:00 Wednesday, 9 November, 2016
Location: E102 Level: Beginner
Ido Safruti (PerimeterX), Ariel Sirota (PerimeterX)
Average rating: ***..
(3.50, 6 ratings)
Bots are a reality, and it’s hard to separate your users and good bots (e.g., search) from the bad ones (brute force, fraud, scrapers, etc.). Ido Safruti and Ariel Sirota review how bots work, explain how to operate a few common bots, and, most importantly, show what you can do to detect and block malicious activity while enabling your users and good bots to work uninterrupted. Read more.
Add to your personal schedule
13:30–17:00 Wednesday, 9 November, 2016
Location: E104/106 Level: Intermediate
Charles Givre (Booz Allen Hamilton)
Drill is an open source, schema-free SQL engine that can query all kinds of data. Applying Drill to network security problems potentially offers a leap forward in network analysis. Charles Givre demonstrates how to use Drill to query simple data, complex data, and data from databases and big data sources and walks you through writing your own functions to extend Drill's functionality. Read more.
Add to your personal schedule
11:20–12:00 Thursday, 10 November, 2016
Location: G103 Level: Intermediate
Nick Sullivan (CloudFlare)
Average rating: ****.
(4.75, 4 ratings)
Bootstrapping the identity of services deployed with Docker containers is hard. Nick Sullivan offers an overview of an open source tool called PAL CloudFlare built to help solve this problem and explains how PAL can be used to bolster the security of your Docker container deployments. Read more.
Add to your personal schedule
13:15–13:55 Thursday, 10 November, 2016
Location: G103 Level: Beginner
Quentin Machu (CoreOS)
Average rating: ****.
(4.33, 3 ratings)
Clair is an open source container image security analyzer that enables developers to build services that scan containers for security threats and vulnerabilities. Quentin Machu offers an overview of Clair and explores a real-life example to demonstrate how Clair is able to automatically detect known vulnerabilities in Docker and rkt containers before they get exploited. Read more.
Add to your personal schedule
14:10–14:50 Thursday, 10 November, 2016
Location: G103 Level: Beginner
Ernest Kim (MITRE Corp.)
Average rating: ***..
(3.00, 2 ratings)
Ernest Kim shares how the MITRE Corporation, a US federally funded research and development center, integrated security tools into its DevOps chain to get continuous insight into the security posture of the various Linux distributions it uses and rapidly deploy fixes when needed. Read more.
Add to your personal schedule
15:50–16:30 Thursday, 10 November, 2016
Location: G103 Level: Intermediate
Jonathan Clarke (Normation)
Average rating: ****.
(4.67, 3 ratings)
Rudder is an open source IT compliance automation tool that focuses on continuously checking configurations to provide a real-time high-level compliance status or break down noncompliance issues to a deep technical level. Jonathan Clarke offers an overview of Rudder and demonstrates how to use it to drill down to any issues that need remediating. Read more.
Add to your personal schedule
16:45–17:25 Thursday, 10 November, 2016
Location: G102 Level: Beginner
Ido Safruti (PerimeterX), Tomer Cohen (Wix.com)
Average rating: *****
(5.00, 6 ratings)
Using social logins is a good way to boost security. However, this often makes site owners complacent, skipping security measures they still need to maintain. Ido Safruti and Tomer Cohen explain how attackers have found ways to exploit this and bypass the auth providers’ defenses, attacking some of the world’s largest services, and demonstrate how to protect yourself from such attacks. Read more.
Add to your personal schedule
11:20–12:00 Friday, 11 November, 2016
Location: G104/105 Level: Intermediate
Ryan Huber (Slack Technologies, Inc), Nate Brown (Slack Technologies, Inc)
Average rating: ***..
(3.67, 6 ratings)
How should an organization approach monitoring networks and hosts to make informed security decisions? Ryan Huber and Nate Brown discuss useful examples of how security and operations teams can become more effective by scaling their visibility into large distributed networks using tools like kernel auditing and large-scale log processing with Elasticsearch and ElastAlert. Read more.
Add to your personal schedule
11:20–12:00 Friday, 11 November, 2016
Location: G103 Level: Intermediate
Dan Amiga (Fireglass), Dor Knafo (Fireglass)
Average rating: *****
(5.00, 3 ratings)
Your engineering team is using AWS for deploying applications, storing data, hybrid networking, and many other services, but what does it mean for IT security? Dan Amiga and Dor Knafoa offer a technical, hands-on overview of how engineering is using AWS and outline the missing security pieces that should be put in place. Read more.
Add to your personal schedule
13:15–13:55 Friday, 11 November, 2016
Location: G103 Level: Intermediate
James Baker (LinkedIn), Mira Thambireddy (LinkedIn)
Average rating: ****.
(4.25, 4 ratings)
As traffic to websites and web applications increases, infrastructure must be put in place to handle scaling—but with that comes an increased risk for security breaches. James Baker and Mira Thambireddy dive into specific client-side vulnerabilities, discussing design patterns that scale an application securely and which frameworks currently in the market already employ these practices. Read more.
Add to your personal schedule
14:10–14:50 Friday, 11 November, 2016
Location: G103 Level: Intermediate
Brian Sletten (Bosatsu Consulting)
Average rating: *****
(5.00, 1 rating)
Brian Sletten introduces Google Macaroons, a fine-grained, decentralized authorization mechanism that is web friendly and suitable for cloud and microservices. Read more.
Add to your personal schedule
15:50–16:30 Friday, 11 November, 2016
Location: G104/105 Level: Intermediate
Richard Freytag (Freytag & Company, LLC)
Average rating: *****
(5.00, 1 rating)
Tests of pseudo-random number generator (PRNG) performance use deterministic analysis to expose weaknesses, which new PRNGs are designed to satisfy. Modern supervised learning algorithms offer an improved method to test PRNG performance. Richard Freytag offers a short, concrete, and intuitive exploration of how to apply machine learning as a black box in pseudo-random number generators. Read more.
Add to your personal schedule
15:50–16:30 Friday, 11 November, 2016
Location: G103 Level: Intermediate
Pat Parseghian (Google)
Average rating: *****
(5.00, 1 rating)
Do you know what’s connected to your network? While 802.1X is commonly used to authenticate connections to wireless networks, successfully applying the same technology to your wired infrastructure is far from straightforward. Pat Parseghian shares the story of what a small, determined team did to make wired 802.1X a reality on Google’s enterprise network. Read more.
Add to your personal schedule
16:45–17:25 Friday, 11 November, 2016
Location: G103 Level: Intermediate
Zane Lackey (Signal Sciences)
Average rating: ****.
(4.00, 1 rating)
The SDLC has been the model for web application security over the last decade. However, the SDLC was originally designed in a waterfall world and often causes more problems than it solves in the shift to Agile, DevOps, and CI/CD. Zane Lackey shares actionable tips on the most effective application security techniques in today's increasingly rapid environment of application creation and delivery. Read more.