Building and maintaining complex distributed systems
June 19–20, 2017: Training
June 20–22, 2017: Tutorials & Conference
San Jose, CA

Schedule: Security sessions

Add to your personal schedule
11:25am–12:05pm Thursday, June 22, 2017
Location: LL21 E/F
Level: Intermediate
Allison Miller (Google)
Average rating: ****.
(4.50, 2 ratings)
Automation is critical for effective operations and security ops. In large-scale systems, manual intervention has to be the exception, not the expectation. But how can security be automated, given the complexity involved? Many platforms turn to ML or AI deployed in risk models. Allison Miller discusses data-driven decision tech and explains how ML and automation creates better defenses. Read more.
Add to your personal schedule
1:15pm–1:55pm Thursday, June 22, 2017
Location: LL21 E/F
Level: Intermediate
James Wickett (Signal Sciences)
Average rating: ****.
(4.33, 3 ratings)
Serverless is the design pattern for writing applications at scale without the necessity of managing infrastructure. It adds simplicity and a new economic model to cloud computing, but it creates some unique security challenges. James Wickett explores practical security approaches for serverless in four key areas: the software supply chain, the delivery pipeline, data flow, and attack detection. Read more.
Add to your personal schedule
2:10pm–2:50pm Thursday, June 22, 2017
Location: LL21 E/F
Level: Intermediate
Douglas Barth (Stripe), Evan Gilman (N/A)
Average rating: ***..
(3.67, 3 ratings)
Douglas Barth and Evan Gilman offer an overview of Zero Trust, a new security model that considers all parts of the network to be equally untrusted. Doug and Evan show how to leverage a network's strengths by combining traditional SRE security approaches with novel technological arrangements while using software and hardware to secure the systems operating in those networks. Read more.
Add to your personal schedule
3:40pm–4:20pm Thursday, June 22, 2017
Location: LL21 E/F
Level: Intermediate
Pete Cheslock (Threat Stack)
Pete Cheslock shares the operational and security practices that helped Threat Stack scale while staying stable and secure, covering technology and tools and the various scale points that forced hard decisions. Read more.
Add to your personal schedule
4:35pm–5:15pm Thursday, June 22, 2017
Location: LL21 E/F
Level: Intermediate
Average rating: ****.
(4.00, 1 rating)
Fastly operates the edge for many large web properties. To deal with emerging threats to its network, Fastly created a process that allows it to respond effectively to incidents: Incident Command, which rapidly coordinates teams during an incident. Maarten Van Horenbeeck and Lisa Phillips take you to the far side of the edge, demonstrating the protocols that work during an incident. Read more.