Track: The Dark Side of Security
Day of week:
There has always been a battle between The Makers and The Breakers. Increasingly, this battle is being played out on the cyber landscape. However, irrespective of where this battle takes place, one thing holds true: The Breakers have the decided advantage. As builders of software, we are The Makers. And if we hope to improve our odds we'll need the equalizing elixir: knowledge of our adversaries. How do they think, what do they do before AND after the compromise, where do they hangout, and...who are "THEY"? All this and more will be covered in this track.
by Olaf Carlson-Wee
Head of Risk @Coinbase
Bitcoin is psuedonymous, instant, and digital. While these characteristics are core aspects of what make bitcoin valuable, it also renders bitcoin companies and their customers ideal targets for the hackers and scammers of the world. A variety of creative tactics have emerged in attempts to steal from bitcoin companies and their customers. Many bitcoin companies have failed due to some combination of security vulnerabilities, exploitation, and fraud. From stolen bank credentials and credit...
by Bryan Payne
LibVMI Creator, OpenStack Security Co-Founder, & Platform Security Team Lead @Netflix
When securing a system, what are the modern realistic threat scenarios that you should be protecting against? And how does use of an IaaS cloud provider shape these threats? This talk will take a deep dive into the murky world of offensive computing. You’ll gain a clear understanding of different types of attackers, their skill sets, and how compromises happen, with a specific focus on protecting cloud-based applications. Along the way you’ll laugh, you’ll cry, and you’ll shift uncomfortably...
by Michael Coates
Trust & Information Security Officer @Twitter
The global cost of cybercrime is estimated at over US $100 billion per year, a financial impact that is comparable to major drug trafficking throughout the world. Accordingly the underground marketplace for vulnerabilities and compromised data is developed with powerful players backed by organized crime. These criminals seek accesses to financial systems, user data and anything that can be easily sold and converted to cash An important step in building secure software is to first learn from...
by Tony Trummer
Creator of QARK and Mobile Security Lead @ Linkedin
You finished your last line of code ahead of schedule, confirmed the app builds properly, passed all your quality tests and now it’s time for that celebratory pizza and beer! A week after launch, you get a call at 3 AM…it’s your boss. Some teenager is tweeting about how your company sucks at security and spelling out all the gory details of where you failed at securing your Android app. How did this happen? Where did you go wrong? Must be some wunderkind hacker, using some serious ninja, 0...
by Christina Camilleri
Penetration Tester & Social Engineer @BishopFox
The weakest link in a security chain is often between keyboard and chair. We have a natural instinct as humans to trust someone’s word and although various technical means have been developed to cope with security threats, human factors have been comparatively neglected. As the infosec industry matures, security attacks are relying more on targeting people personally, often through social engineering. People can’t be fixed the same way a bug in your software can -- they can’t be maintained...
Covering innovative topics
Monday Nov 16
Architectures You've Always Wondered About
Silicon Valley to Beijing: Exploring some of the world's most intrigiuing architectures
Applied Machine Learning
How to start using machine learning and data science in your environment today. Latest and greatest best practices.
Browser as a platform (Realizing HTML5)
Exciting new standards like Service Workers, Push Notifications, and WebRTC are making the browser a formidable platform.
Modern Languages in Practice
The rise of 21st century languages: Go, Rust, Swift
Our most innovative companies reimagining the org structure
Level up your approach to problem solving and leave everything better than you found it.
Tuesday Nov 17
Containers in Practice
Build resilient, reactive systems one service at a time.
Architecting for Failure
Your system will fail. Take control before it takes you with it.
Modern CS in the Real World
Real-world Industry adoption of modern CS ideas
The Amazing Potential of .NET Open Source
From language design in the open to Rx.NET, there is amazing potential in an Open Source .NET
Keeping life in balance is always a challenge. Learning lifehacks
Unlearning Performance Myths
Lessons on the reality of performance, scale, and security
Wednesday Nov 18
Streaming Data @ Scale
Real-time insights at Cloud Scale & the technologies that make them happen!
Taking Java to the Next Level
Modern, lean Java. Focuses on topics that push Java beyond how you currently think about it.
The Dark Side of Security
Lessons from your enemies
Taming Distributed Architecture
Reactive architectures, CAP, CRDTs, consensus systems in practice
Lessons on building highly effective organizations