| | | |
Akamai Alerting and Logging | | | |
Akamai WAF & Ruleset | | | |
AWS Lambda Security | How to secure Lambda functions | | |
AWS Macie and Guard Duty | | | |
AWS Scenarios | | | |
AWS WAF for DDoS Mitigation | AWS WAF in real world scenarios | | |
Azure Security Features, Just a Few | A demonstration of a few of Azure's Security features including - Access Control (AIM), Just in Time (JIT), Security Center Recommendations, Virtual Machine Security Recommendations, and Key Vault. | Microsoft Azure | public |
Dark and Deep Web Threat Intelligence Source | Understand the Deep Web and the Dark Web How to Guard Your Network Sharing knowledge on Dark and Deep Web Open Source Intelligence | | Chatham House Rules |
Darktrace Alerts | Share knowledge on DarkTrace alerts | | Chatham house rules |
Darktrace API & Elastic Stack | Share knowledge on DarkTrace alerts | | Chatham house rules |
Darktrace Tuning Session | Share knowledge on tunning DarkTrace | | Chatham house rules |
Dependency management using Snyk | Hands on session on how to best use Snyk for dependency management | Snyk | public |
Hands on Avatao path on Java | Try the Avatao learning platform | Avatoo | public |
Hands on Avatao path on Owasp Top 10 | Try the Avatao learning platform | Avatao | public |
Incident handling with DarkTrace | Share knowledge on incident handling with DarkTrace | | Chatham house rules |
Integrate securityheaders.com in CI pipeline | Hands on session on how to integrate securityheaders.com in CI pipeline | | public |
Owasp corporate membership | Meet the Owasp team and learn about the benefits of becoming an Owasp corporate member | Owasp | public |
Replacing Akamai with AWS Shield | | | |
Securing AWS S3 Buckets | | | |
Using a Rules Engine and Risk Patterns with IriusRisk | During this session we’ll drive the attendants through the IriusRisk approach and the main core features of the solution. | Continuum Security | public |
Using AWS Neptune GraphDB | | | |
Using Elastic Stack services | When to move the Elastic (ELK) stack from Open source into the commercial services provided by Elastic | | public |
Using Neo4J Enterprise | When to move Neo4J from Open source engines into the Neo4J Enterprise version provided by Neo4J | | public |
Using sumo logic to handle-incidents | | | |
Using The Hive for Incident Response | Hands on session on using a customized version of the The Hive for Incident Response | | Chatham house rules |
Using Veracode SAST Engine | Hands on session on how to use Veracode's SAST Engine | | public |
Writing Akamai rules | Share knowledge on incident handling with Akamai | | Chatham house rules |
Writing Checkmarx SAST rules | Hands on session on how to write custom rules for the Checkmarx SAST engine | | public |