SESSION + Live Q&A
Security Open Space
Speaker

Richard Kasperowski
Author of The Core Protocols: A Guide to Greatness
Richard Kasperowski is a speaker, trainer, coach, and author focused on high-performance teams. Richard is the author of The Core Protocols: A Guide to Greatness. He leads clients in building great teams that get great results using the Core Protocols, Agile, and Open Space Technology. Richard...
Read moreFind Richard Kasperowski at:
From the same track
Real-Time Fraud Detection with Graphs
Finance is awash with data, but much of it is discrete items locked up in silos waiting to be joined up to provide insights. Graph data is different: it's joined by default and oozes domain-specific insight. In this talk we'll discuss several kinds of fraud common in financial services and see...

Jim Webber
Chief Scientist @Neo4j
Building a Modern Security Engineering Team
Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. This talk with discuss how security adapts effectively to these changes, specifically covering: Practical advice for building and scaling modern application and infrastructure security...

Zane Lackey
Founder & CSO @SignalSciences, Previously @Etsy
Bitcoin Security: 1/10th cent to a billion dollars
Bitcoin allows for new applications that utilize programmatic nanopayments smaller than a penny. Alternatively, bitcoin also allows millions of dollars to be stored on a flash drive, on a piece on paper, or in a passphrase. These disparate ways of using the same underlying bitcoin protocol...

Olaf Carlson-Wee
Head of Special Projects @Coinbase
Nihilist’s Guide to Wrecking Humans and Systems
The fault of the computer system is that it can only follow instructions. The fault of the human is that it can only make judgement calls. When we think about this in relation to information security, it presents an interesting opportunity to destructively combine the two and use it for evil. We...

Christina Camilleri
Security Solutions Specialist @@riotgames

Shubham Shah
Security Analyst @BishopFox
Automating Security at Slack
Monitoring for potentially malicious activity in an environment and handling the resulting alerts is vital to the success of a defensive security program. Powerful centralized logging is accessible to all of us, but it is only useful if we understand and take action on the data collected. How do...

Ryan Huber
Security at Slack Technologies, Inc