James Arlen leads a hands-on exploration of techniques for protecting the cloud, with extensive labs in Amazon Web Services. The first day focuses on root account security, virtual networking security, IAM, and logging and monitoring; the second day covers leveraging PaaS services, using immutable infrastructure, and automating security controls.
Data analysis and machine learning for cybersecurity
Charles Givre (Deutsche Bank), Jay Jacobs (BitSight Technologies)
Join experts Jay Jacobs and Charles Givre for a hands-on, in-depth exploration of data analysis and machine learning in cybersecurity. You’ll learn how to explore and analyze data you probably already have and gain valuable exposure to and experience with tools and techniques to prepare, analyze, and visualize the knowledge hiding in your data.
Tools and processes
Whiteboard hacking: Hands-on threat modeling
Steven Wierckx (Toreon)
Drawing on real-world use cases—including hotel booking web and mobile applications that share the same REST backend, an internet of things deployment with an on-premises gateway and secure update service, and an HR services OAuth scenario for mobile and web applications—Steven Wierckx walks you through performing practical threat modeling and discusses privacy threats and privacy by design.