Security

Past Presentations

Security Open Space

The Quantum Risk & Future Post-Quantum Standards

This talk will describe the risk of quantum computing to cryptography, in a way suitable to an audience without quantum physics nor cryptography background.  We will present the mitigations available today thanks to research in the field of post-quantum cryptography, and we'll...

Jean-Philippe Aumasson Author of "Serious Cryptography", Designer of Hash Functions BLAKE3 and BLAKE2
Security Champions: Only YOU Can Prevent File Forgery

As a Developer, there will come a time when you realize that you have the power to not only ship awesome features, but also protect them so that no one else can tamper with all your hard work. Every Developer is responsible for coding securely, but there are a brave few among us that will take...

Marisa Fagan Product Security Lead @Synopsys
Attack Trees, Security Modeling for Agile Teams

Agile software development and security often don’t feel like good bedfellows. Many traditional security methodologies for analysing risk and threats are based on old military or government based software development methodologies which favour traditional, slow moving, low change...

Michael Brunton-Spall Independent Security Consultant, previously Deputy Director for Technology and Operation, & Head of CyberSecurity of Government Digital Service
How Performance Optimizations Shatter Security Boundaries

With the customers demand of high-performance computing, CPU manufacturers deploy more and more sophisticated optimizations in their processors to increase the performance as much as possible. However, these performance optimizations often come with the downside of enabling side-channel attacks...

Moritz Lipp Researcher in Information Security at Graz University of Technology

Interviews

Marisa Fagan Product Security Lead @Synopsys

Security Champions: Only YOU Can Prevent File Forgery

What is the focus of the work that you do today?

Right now I'm working at Synopsis on a team called Product Security, and the focus of our work is to increase the amount of security activities that the engineering team is doing for our products. Our goal is to make the most secure product possible and to increase the security mindset of our employees in the engineering department for...

Read Full Interview
Moritz Lipp Researcher in Information Security at Graz University of Technology

How Performance Optimizations Shatter Security Boundaries

What is the focus of your work today?

The work of our Secure Systems group at Graz University of Technology focuses on the secure and efficient implementation of (cryptographic) algorithms, security architectures as well as side-channel and fault attacks. Personally, my main focus is on microarchitectural side-channel attacks on personal computers and mobile devices. We...

Read Full Interview
Sonya Moisset Lead Security Engineer @Photobox / Tech Lead @PrideInLondon

Keep Calm and Secure Your CI/CD Pipeline

What is the work that you are doing today?

In my day job, I'm the lead security engineer at Photobox. I'm in charge of application security, cloud security and network security within my team. And for Pride in London, I'm the tech lead and the security manager. I take care of the website and the application, manage a team of fifteen developers and implement features...

Read Full Interview
Katy Anton Principal Application Security Consultant @Veracode

Security Vulnerabilities Decomposition

What is the work you're doing today?

Today I work as an application security consultant at Veracode. As part of my job, I help developers and software architects to secure their software. I work with development teams and help them fix correctly the security flaws identified by automated tools, to ensure that they have been remediated in a secure manner.

Read Full Interview
Jean-Philippe Aumasson Author of "Serious Cryptography", Designer of Hash Functions BLAKE3 and BLAKE2

The Quantum Risk & Future Post-Quantum Standards

What is the work that you're doing today?

My specialty is applied cryptography and more generally, information security. I'm running a startup company called Teserakt, which specializes in security for IoT systems. We do a new type of protocol to provide end-to-end encryption in the IoT context to protect data from the data producer to the data consumer.

Read Full Interview

Less than

18

weeks until QCon London 2022

Registration is £1715.00 (£275 off) for the 3-day conference if you register before Dec 7th
SAVE YOUR SEAT

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.