Spies, Secret Messages, the Internet, and You!
Presented by: Matt Williams
Have you ever wanted to make a secret message? Unreadable without the key? ...
Format: KidzMash SessionzLevel: Introductory and overviewRealizing The Benefits Of Container DevSecOps With AWS
Presented by: James Strong, Colin Detwiller, Matthew Garber
Attendees will learn how to set up, harden, & secure a container pipeline in AWS in this workshop using no servers for that pipeline. Please attend, If you’re interested in integrating security and compliance into a container pipeline to realize the benefits of DevSecOps. We will be using these...
Format: PreCompilerLevel: IntermediateWatch How The Giants Fall: Learning from Bug Bounty Results
Presented by: John Melton
Security is hard. We all miss things. Attackers find things. ...
Format: General SessionLevel: Introductory and overviewProtecting your API with OAuth
Presented by: Dan Moore
OAuth is a well known standard and is useful for delegating authentication and authorization decisions to a central identity provider. As a developer, you’ve given a token when a grant completes. ...
Format: General SessionLevel: Introductory and overviewKeeping your Kubernetes Cluster Secure
Presented by: Gene Gotimer
Many organizations are shifting to containers and Kubernetes, and that move means learning new ways to secure their environments. Kubernetes clusters have to be hardened at different levels. We have to consider the nodes where the Kubernetes control plane is running. We also need to secure the...
Format: General SessionLevel: IntermediateJakarta EE 10 is Coming Your Way!
Presented by: Ivar Grimstad
Jakarta EE 9 lowered the barriers of entry and established a foundation for future innovation paving the way for Jakarta EE 10. ...
Format: General SessionLevel: Intermediate