Tuesday, December 7, 2021
It is very important nowadays to stay up to date with all of the cyber threats that are posing all over the world. It is widely known that there are not enough resources to be found to fill up every Security Operation Center (i.e. SOC). Therefore, many organizations struggle with coping with the massive amount of new type of attacks and generated alerts from their tooling.During this session, you will learn how to hunt (and automate your hunt) for active cyber threats in your environment and contain them using integrated connections to network, endpoint, and cloud products. This session is targeted at SOC management, cyber security engineers, threat hunters, and analysts. It will touch on threat detection, investigation and response. All the code will be made available after the session.
A detailed talk on how to approach app modernization covering the following --
how to move web apps running on plain virtual machines to a containerized setup and how to orchestrate those with a managed kubernetes service
how to scale these out?
Why IaC (Infrastructure as code) is important and a sample show casing resource spin off.
How to continously integrate and deliver these applications?
And finally touch base a little bit on security aspects
APIs are the data fabrics connecting modern applications. While it is a powerful tool for Dev and DevOps, it has also become a new attack surface for bad actors to gain access to sensitive data. Many existing API security solutions today are so inflexible and rule driven that they risk slowing down the development process. Lebin Cheng, Imperva’s Head of API Security, will help you navigate through the API Security noise with insights on:DevSecOps does not mean Dev and Sec need to slow each other down. How automated SecOps can speed up Dev and DevOps? What is the right DevSecOps approach to implement API Security?First hand insight into how a DigitalFirst organization took the first steps towards DevSecOps API Security, and how you can too?Other DevSecOps best practices.
Cloud is complex. We are running ever more services in ever more places with ever more dependencies. As a result, we see deployments stir up failures and breaches go undetected. Service meshes help manage the explosion in east-west traffic but running a complex environment is not a matter of better routing or tracing requests. It must be controlled at runtime.This talk recounts the learnings from running a service mesh for reliability and security engineers at a large managed-services provider.
Kubernetes is hard. Running your data rich applications on Kubernetes platform does not make it any easier. One of the key challenges with cloud native applications is data management.
Join this session to learn:
1. Common challenges with provisioning and protecting data used in Kubernetes applications
2. How to define application 'state' in holistic terms
3. How to seamlessly provision and protect data to Kubernetes applications
Wednesday, December 8, 2021
Event-Driven Architectures (EDA ) are perceived as mythical objects that instantly transform your systems into "real-time" ones! BUT, come to think of it, aren't they already "real-time"? I mean, adding an item to the cart is pretty much instant in ( most ) webshops. In fact, EDA solves an entirely different set of problems and with the help of Apache Kafka, we will walk through the (re)evolution path. Microservices are easy to get started with, but once we do, we keep stumbling across the same issues: data access, consistency, and failures ( sounds familiar? ).The solution? Patterns, patterns, patterns … You’ve probably heard about terms such as “Event Notification”, “Event-carried State Transfer”, or even “Event Sourcing”, but how can they be used to solve our problems? And more importantly, how can we use Apache Kafka to take advantage of these patterns I guess we will find out soon!
Experience a combination of a blazing-fast React-based framework (Gatsby) and the headless CMS (Storyblok) that works for developers & business users.You'll learn how to develop & deploy a blazing fast blog using the real-time visual editor & component-based approach which makes content editing easier. All in less than 30 minutes! I promise you - your marketers & content editors will love it and you will finally develop without any restrictions or hidden traps. Long live Jamstack!
Is it possible for a computer program to write its own programs? While this kind of idea could seem far-fetched, it may actually be closer than we think. This presentation introduces “AI Programmer”, a machine learning system, which can automatically generate full software programs requiring only minimal human guidance. The system uses genetic algorithms coupled with a tightly constrained programming language. We’ll cover an overview of the system design and see examples of its software-generation capabilities.