SESSION + Live Q&A
Security Champions: Only YOU Can Prevent File Forgery
As a Developer, there will come a time when you realize that you have the power to not only ship awesome features, but also protect them so that no one else can tamper with all your hard work. Every Developer is responsible for coding securely, but there are a brave few among us that will take this power one step further by wearing the mantle of a Security Champion.
This talk will be your guide to becoming the Security Champion you always wanted to be, in just 5 easy steps. We’ll also talk about what benefits you get out of it, besides saving the world, and what to do if your company doesn’t have a Security Champions program or even a Product Security program.
Speaker
Marisa Fagan
Product Security Lead @Synopsys
Marisa Fagan is the Product Security Lead at Synopsys in SF, US. She works on building security into every phase of the SDLC and empowering developers to not need her. Previously in her career, she has worked as a security culture expert at places like Salesforce, Facebook, Bugcrowd, and Errata...
Read moreFrom the same track
Encryption Without Magic, Risk Mngmnt Without Pain
In-depth technical inquiry about cryptography in a wider context: how it helps to narrow more significant risks to controlled attack surfaces, enables managing the risk efficiently and elegantly, how tools and algorithms sit in a broader context of managing infrastructure-wide risks associated...
Anastasiia Voitova
Head of Customer Solutions, Security Software Engineer @CossackLabs
Bigger, Faster and More Secure
Many people don't care about security. It's OK, don't worry! I'm not judging. Security is the world of defense, of caution and of risk. Securing systems is hard and we don't have great solutions to the many challenges it poses. Security folk on the whole are the least exciting people to invite...
Laura Bell
Founder of SafeStack
Security Open Space
Attack Trees, Security Modeling for Agile Teams
Agile software development and security often don’t feel like good bedfellows. Many traditional security methodologies for analysing risk and threats are based on old military or government based software development methodologies which favour traditional, slow moving, low change...
Michael Brunton-Spall
Independent Security Consultant, previously Deputy Director for Technology and Operation, & Head of CyberSecurity of Government Digital Service
EternalBlue: Exploit Analysis and Beyond
In this presentation we will analyze the EternalBlue exploit that was leaked in early 2017 which was then abused to great effect throughout the year. Beginning a journey into InfoSec research can be daunting. We will discuss how targeted analysis can help develop security skills while...
Emma McCall
Security Analyst @RiotGames