Jason Chan discusses how security teams can use thoughtful tools and automation to improve relationships with development teams while creating a more secure and manageable environment.
Alex Holden talks about hackers and their attacks, their latest techniques and the defenses needed today and tomorrow. He also talks about a number of recent breaches as well as lessons learned.
Jarrod Overson talks about a world where passwords are traded, sold, verified, and used to exploit sites, how to recognize malicious traffic, and how to take a stand against attackers.
Rob Winch and Joe Grandja discuss how to easily secure an application with Spring Security 4.1 and focus on some of the new features found in Spring Security 4.1.
David Ferriera describes how ForgeRock provides a standards-based blueprint that offers a flexible solution to balance security and performance while protecting Cloud Foundry services end-to-end.
Justin Smith discusses credential hygiene in distributed systems, covering topics such as key encrypting keys, hardware security modules, and promising advances in muti-party computation.
Nicole Forsgren shares the results of studies spanning four years and 25,000 DevOps data points: continuous delivery and Lean management practices improves quality and security outcomes.
Alan Ho and Sandeep Murusupalli discuss the right type of protection (OAuth/Throttling) and monitoring (e.g. bot monitoring) needed to be put in place to properly manage microservices.
Kymberlee Price discusses vulnerability data and explores the source and spread of these vulnerabilities through products, along with advice on what can be done to address security vulnerabilities.
Michael Hausenblas introduces containers, microservices and dealing with security, monitoring and troubleshooting using Apache Mesos/Marathon and Kubernetes.
Olaf Carlson-Wee examines various novel cryptosystems used to facilitate the secure storage of billions of dollars in global crypto banks.
Justin Smith outlines principles and practices of Cloud Native Security and how Cloud Foundry can be part of a strategy to increase velocity and security.