You are viewing content from a past/completed QCon -


Security Open Space


Richard Kasperowski

Author of The Core Protocols: A Guide to Greatness

Richard Kasperowski is a speaker, trainer, coach, and author focused on high-performance teams. Richard is the author of The Core Protocols: A Guide to Greatness. He leads clients in building great teams that get great results using the Core Protocols, Agile, and Open Space Technology. Richard...

Read more
Find Richard Kasperowski at:

From the same track

SESSION + Live Q&A Neo4j

Real-Time Fraud Detection with Graphs

Finance is awash with data, but much of it is discrete items locked up in silos waiting to be joined up to provide insights. Graph data is different: it's joined by default and oozes domain-specific insight. In this talk we'll discuss several kinds of fraud common in financial services and see...

Jim Webber

Chief Scientist @Neo4j

SESSION + Live Q&A Security

Building a Modern Security Engineering Team

Continuous deployment and the DevOps philosophy have forever changed the ways in which businesses operate. This talk with discuss how security adapts effectively to these changes, specifically covering: Practical advice for building and scaling modern application and infrastructure security...

Zane Lackey

Founder & CSO @SignalSciences, Previously @Etsy

SESSION + Live Q&A Bitcoin

Bitcoin Security: 1/10th cent to a billion dollars

Bitcoin allows for new applications that utilize programmatic nanopayments smaller than a penny. Alternatively, bitcoin also allows millions of dollars to be stored on a flash drive, on a piece on paper, or in a passphrase. These disparate ways of using the same underlying bitcoin protocol...

Olaf Carlson-Wee

Head of Special Projects @Coinbase

SESSION + Live Q&A Security

Nihilist’s Guide to Wrecking Humans and Systems

The fault of the computer system is that it can only follow instructions. The fault of the human is that it can only make judgement calls. When we think about this in relation to information security, it presents an interesting opportunity to destructively combine the two and use it for evil. We...

Christina Camilleri

Security Solutions Specialist @@riotgames

Shubham Shah

Security Analyst @BishopFox

SESSION + Live Q&A Slack

Automating Security at Slack

Monitoring for potentially malicious activity in an environment and handling the resulting alerts is vital to the success of a defensive security program. Powerful centralized logging is accessible to all of us, but it is only useful if we understand and take action on the data collected. How do...

Ryan Huber

Security at Slack Technologies, Inc


Real-Time Decision Making by Aerospike

View full Schedule