| | | |
| Akamai Alerting and Logging | | | |
| Akamai WAF & Ruleset | | | |
| AWS Lambda Security | How to secure Lambda functions | | |
| AWS Macie and Guard Duty | | | |
| AWS Scenarios | | | |
| AWS WAF for DDoS Mitigation | AWS WAF in real world scenarios | | |
| Azure Security Features, Just a Few | A demonstration of a few of Azure's Security features including - Access Control (AIM), Just in Time (JIT), Security Center Recommendations, Virtual Machine Security Recommendations, and Key Vault. | Microsoft Azure | public |
| Dark and Deep Web Threat Intelligence Source | Understand the Deep Web and the Dark Web How to Guard Your Network Sharing knowledge on Dark and Deep Web Open Source Intelligence | | Chatham House Rules |
| Darktrace Alerts | Share knowledge on DarkTrace alerts | | Chatham house rules |
| Darktrace API & Elastic Stack | Share knowledge on DarkTrace alerts | | Chatham house rules |
| Darktrace Tuning Session | Share knowledge on tunning DarkTrace | | Chatham house rules |
| Dependency management using Snyk | Hands on session on how to best use Snyk for dependency management | Snyk | public |
| Hands on Avatao path on Java | Try the Avatao learning platform | Avatoo | public |
| Hands on Avatao path on Owasp Top 10 | Try the Avatao learning platform | Avatao | public |
| Incident handling with DarkTrace | Share knowledge on incident handling with DarkTrace | | Chatham house rules |
| Integrate securityheaders.com in CI pipeline | Hands on session on how to integrate securityheaders.com in CI pipeline | | public |
| Owasp corporate membership | Meet the Owasp team and learn about the benefits of becoming an Owasp corporate member | Owasp | public |
| Replacing Akamai with AWS Shield | | | |
| Securing AWS S3 Buckets | | | |
| Using a Rules Engine and Risk Patterns with IriusRisk | During this session we’ll drive the attendants through the IriusRisk approach and the main core features of the solution. | Continuum Security | public |
| Using AWS Neptune GraphDB | | | |
| Using Elastic Stack services | When to move the Elastic (ELK) stack from Open source into the commercial services provided by Elastic | | public |
| Using Neo4J Enterprise | When to move Neo4J from Open source engines into the Neo4J Enterprise version provided by Neo4J | | public |
| Using sumo logic to handle-incidents | | | |
| Using The Hive for Incident Response | Hands on session on using a customized version of the The Hive for Incident Response | | Chatham house rules |
| Using Veracode SAST Engine | Hands on session on how to use Veracode's SAST Engine | | public |
| Writing Akamai rules | Share knowledge on incident handling with Akamai | | Chatham house rules |
| Writing Checkmarx SAST rules | Hands on session on how to write custom rules for the Checkmarx SAST engine | | public |