Build Better Defenses
October 29–30, 2017: Training
October 30–November 1, 2017: Tutorials & Conference
New York, NY
 
Clinton
Add Pragmatic cloud security: AWS edition to your personal schedule
9:00am Pragmatic cloud security: AWS edition James Arlen (Securosis)
Madison
Add Data analysis and machine learning for cybersecurity to your personal schedule
9:00am Data analysis and machine learning for cybersecurity Charles Givre (Orbital Insight), Jay Jacobs (BitSight Technologies)
Gibson
Add Whiteboard hacking: Hands-on threat modeling  to your personal schedule
9:00am Whiteboard hacking: Hands-on threat modeling Steven Wierckx (Toreon)
12:30pm Lunch | Room: Rendezvous
10:30am Morning break | Room: 2nd Floor Foyer
3:00pm Afternoon break | Room: 2nd Floor Foyer
9:00am-5:00pm (8h)
Pragmatic cloud security: AWS edition
James Arlen (Securosis)
James Arlen leads a hands-on exploration of techniques for protecting the cloud, with extensive labs in Amazon Web Services. The first day focuses on root account security, virtual networking security, IAM, and logging and monitoring; the second day covers leveraging PaaS services, using immutable infrastructure, and automating security controls.
9:00am-5:00pm (8h)
Data analysis and machine learning for cybersecurity
Charles Givre (Orbital Insight), Jay Jacobs (BitSight Technologies)
Join experts Jay Jacobs and Charles Givre for a hands-on, in-depth exploration of data analysis and machine learning in cybersecurity. You’ll learn how to explore and analyze data you probably already have and gain valuable exposure to and experience with tools and techniques to prepare, analyze, and visualize the knowledge hiding in your data.
9:00am-5:00pm (8h) Tools and processes
Whiteboard hacking: Hands-on threat modeling
Steven Wierckx (Toreon)
Drawing on real-world use cases—including hotel booking web and mobile applications that share the same REST backend, an internet of things deployment with an on-premises gateway and secure update service, and an HR services OAuth scenario for mobile and web applications—Steven Wierckx walks you through performing practical threat modeling and discusses privacy threats and privacy by design.
12:30pm-1:30pm (1h)
Break: Lunch
10:30am-11:00am (30m)
Break: Morning break
3:00pm-3:30pm (30m)
Break: Afternoon break