SESSION + Live Q&A
Bitcoin Security: 1/10th cent to a billion dollars
Bitcoin allows for new applications that utilize programmatic nanopayments smaller than a penny. Alternatively, bitcoin also allows millions of dollars to be stored on a flash drive, on a piece on paper, or in a passphrase. These disparate ways of using the same underlying bitcoin protocol require vastly different security models.
This talk explores micropayment and wealth storage use cases for bitcoin and examines the various novel cryptosystems used to facilitate micro-penny payments and secure billions of dollars in global bitcoin banks.
Speaker
Olaf Carlson-Wee
Head of Special Projects @Coinbase
Olaf is the Head of Special Projects at Coinbase, the largest bitcoin company in the world, where he was the first employee. He received a BA from Vassar College after completing his thesis on distributed networking, the implications of the mass adoption of bitcoin, and the development of open...
Read moreFind Olaf Carlson-Wee at:
From the same track
Real-Time Fraud Detection with Graphs
Finance is awash with data, but much of it is discrete items locked up in silos waiting to be joined up to provide insights. Graph data is different: it's joined by default and oozes domain-specific insight. In this talk we'll discuss several kinds of fraud common in financial services and see...
Jim Webber
Chief Scientist @Neo4j
Building a Modern Security Engineering Team
Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. This talk with discuss how security adapts effectively to these changes, specifically covering: Practical advice for building and scaling modern application and infrastructure security...
Zane Lackey
Founder & CSO @SignalSciences, Previously @Etsy
Nihilist’s Guide to Wrecking Humans and Systems
The fault of the computer system is that it can only follow instructions. The fault of the human is that it can only make judgement calls. When we think about this in relation to information security, it presents an interesting opportunity to destructively combine the two and use it for evil. We...
Christina Camilleri
Security Solutions Specialist @@riotgames
Shubham Shah
Security Analyst @BishopFox
Automating Security at Slack
Monitoring for potentially malicious activity in an environment and handling the resulting alerts is vital to the success of a defensive security program. Powerful centralized logging is accessible to all of us, but it is only useful if we understand and take action on the data collected. How do...
Ryan Huber
Security at Slack Technologies, Inc
Security Open Space
Richard Kasperowski
Author of The Core Protocols: A Guide to Greatness