Open Security Summit Nov 12, 2021. Using Teleport to Secure SSH and Kubernetes Access. By Sakshyam Shah Teleport is a Certificate Authority and an Access Plane for your infrastructure.
Are you using Auth0 in your application for user logins? How will you monitor the Auth0 logs and detect user actions that could indicate security concerns? In this session, we will see how Datadog helps you to extend security monitoring by analyzing Auth0 User activities in the logs. And also we will see how to set up threat detection rules to trigger notifications automatically based on them.
Hear from Former Director of the Cybersecurity and Infrastructure Security Agency (CISA), Chris Krebs, about his experiences and insights into the priorities companies should be focusing on to combat the growing threat of Ransomware.
Join Nicole Perlroth, acclaimed reporter at The New York Times cybersecurity and author of “This is How They Tell Me the World Ends” and Bipul Sinha, Rubrik CEO, for a captivating fireside chat on emerging cybercrime and what you need to prioritize in order to fight back.
The first 24 hours after a major security incident are critical to keeping your business up and running. What can you do to protect your organization’s valuable data and critical IT assets in the event of a ransomware attack? Come listen to Kevin Mandia, Mandiant CEO and security expert to learn best practices that IT leaders can put into practice today. Hear about the successes (and failures) of other organizations, and how your team can avoid being a victim.
Is your data safe from ransomware attacks? Hear from security leaders from both the private and public sectors to learn why network, perimeter, and application security isn’t enough. Learn about new cyber/ransomware threats, how ransomware impacts every layer of your organization from board decisions to shareholder value, and how you can survive an attack without paying the ransom.
Session 1: Build a smooth ci/cd pipeline using gitops and fluxv2. Working in a fast growing company raises a wide range of technical and organisational challenges.
Session 1: From attack to writing code...what do you need to know as a developer? We will look at a concrete attack called: "XML external entity attack (XXE)" and see how we can trace it back to writing code. The described mitigations are simple: configure your parser securely, but is it this simple? We will focus on some examples and see if we can catch the attack with tests, code reviews, etc. Nanne Baars, Developer at Xebia and OWASP WebGoat Project lead