Conference: Nov 13-15, 2017
Workshops: Nov 16-17, 2017
Track: //TODO: Security <-- fix this
Location:
- Pacific LMNO
Day of week:
- Wednesday
Those who spend money on the best locks are often the people who have seen the worst happen. Learn from those who have lived through catastrophes (or caused them) so that you can get a glimpse of the world you hopefully never have to be part of. From penetration testing to reverse engineering, to forensics, see what goes into the attacks straight from the experts.
by Jason Chan
Director of Engineering - Cloud Security @Netflix
Historically, relationships between developers and security teams have been challenging. Security teams sometimes see developers as careless and ignorant of risk, while developers might see security teams as dogmatic barriers to productivity.
Can technologies and approaches such as the cloud, APIs, and automation lead to happier developers and more secure systems? Netflix has had success pursuing this approach, by leaning into the fundamental cloud concept of self-service, the Netflix...
by Connor Tumbleson
Developer @SourceToad & Apktool Maintainer
If you own an Android device, you’ve more than likely heard of an APK file. How easy are Android distributables to examine and extract information?
Some companies assume resources, APIs and more are private among the APK while others, aware of the risk, take part in a constant cat and mouse game of application security. A variety of tools have additionally emerged to make the extracting of contents from an APK much more difficult.
In this talk we will look at the Android...
by Alex Holden
Founder and Chief Information Security Officer at Hold Security, LLC
Hackers are learning from our mistakes and developing more resilient and devastating attacks. Our defenses, while improving, are making the same mistakes as they have for decades. We will discuss a number of recent breaches as well as lessons learned.
What drives hackers toward their ill gains in 2016? What are their latest techniques? What should our defenses be today and transform into tomorrow?
by Jarrod Overson
Web Addict, Director of Engineering @ShapeSecurity
Ashley Madison data stolen...
Yahoo confirms biggest breach ever...
10 million passwords leaked! 80 million! 500 million!
What does this mean to you and your websites? You use secure passwords, your sites haven’t been compromised, and you have safeguards in place to protect your customers, so you don’t need to worry, right?
Right?
Jarrod Overson reveals the world where these passwords are traded, sold, verified, and used to exploit your sites. Even if you are...
by Albert Yu
Principal Security Engineer @Atlassian
The war between web application attackers and defenders have never ended. In reality, it is getting more and more severe. Looking at the tremendous ways of defending web applications, why attackers are still winning?
"Not knowing your enemy, a victory will always follow with another loss."
Real world attackers and bug bounty hunters are extremely capable nowadays. I'll go through some of the most interesting ones. You will probably be surprised with the determination and...
.
Tracks
Monday Nov 7
-
Architectures You've Always Wondered About
You know the names. Now learn lessons from their architectures
-
Distributed Systems War Stories
“A distributed system is one in which the failure of a computer you didn't even know existed can render your own computer unusable.” - Lamport.
-
Containers Everywhere
State of the art in Container deployment, management, scheduling
-
Art of Relevancy and Recommendations
Lessons on the adoption of practical, real-world machine learning practices. AI & Deep learning explored.
-
Next Generation Web Standards, Frameworks, and Techniques
JavaScript, HTML5, WASM, and more... innovations targetting the browser
-
Optimize You
Keeping life in balance is a challenge. Learn lifehacks, tips, & techniques for success.
Tuesday Nov 8
-
Next Generation Microservices
What will microservices look like in 3 years? What if we could start over?
-
Java: Are You Ready for This?
Real world lessons & prepping for JDK9. Reactive code in Java today, Performance/Optimization, Where Unsafe is heading, & JVM compile interface.
-
Big Data Meets the Cloud
Overviews and lessons learned from companies that have implemented their Big Data use-cases in the Cloud
-
Evolving DevOps
Lessons/stories on optimizing the deployment pipeline
-
Software Engineering Softskills
Great engineers do more than code. Learn their secrets and level up.
-
Modern CS in the Real World
Applied, practical, & real-world dive into industry adoption of modern CS ideas
Wednesday Nov 9
-
Architecting for Failure
Your system will fail. Take control before it takes you with it.
-
Stream Processing
Stream Processing, Near-Real Time Processing
-
Bare Metal Performance
Native languages, kernel bypass, tooling - make the most of your hardware
-
Culture as a Differentiator
The why and how for building successful engineering cultures
-
//TODO: Security <-- fix this
Building security from the start. Stories, lessons, and innovations advancing the field of software security.
-
UX Reimagined
Bots, virtual reality, voice, and new thought processes around design. The track explores the current art of the possible in UX and lessons from early adoption.