29:40 Evasive Maneuvers: Strategies to Overcome Runtime Detection Tools - Amit Schendel, ARMO CNCF [Cloud Native Computing…
35:49 SaaC – Security as a Culture, the Distributed Advocacy - Deep Patel, Cisco CNCF [Cloud Native Computing…
42:08 API Security: Code-to-Cloud Context for Complete Protection - Idan Plotnik & Patrick Sullivan CNCF [Cloud Native Computing…
33:04 Malicious Compliance Automated: Building Secure Containers and Obfusca... Kyle Quest & Duffie Cooley CNCF [Cloud Native Computing…
5:01 Lightning Talk: Speak Egress and Exit: A Look at Securing Traf... Nina Polshakova & Ariana Weinstock CNCF [Cloud Native Computing…
5:30 Lightning Talk: Security Down to the Kernel - Justin Garrison, Sidero Labs CNCF [Cloud Native Computing…
30:26 Navigating the Quantum Readiness Journey: Securing Kubernetes with Quantum-Resis... Tomas Gustavsson CNCF [Cloud Native Computing…
28:59 Detection Engineering in Kubernetes Environments: Wrangling Security Data Out of You... Dakota Riley CNCF [Cloud Native Computing…
37:20 CSI Forensics: Unraveling Kubernetes Crime Scenes - Alberto Pellitteri & Stefano Chierici, Sysdig CNCF [Cloud Native Computing…
38:55 Leveraging the Linux Kernel for Building a Zero-Trust Environment With... Marton Sereg & Zsolt Varga CNCF [Cloud Native Computing…
21:19 Navigating the Intersection: AI’s Role in Shaping the Secure Open Source Software Ecos... Harry Toor CNCF [Cloud Native Computing…
36:05 Championing Security: Scaling Security at Every Level - Dwayne McDaniel, GitGuardian CNCF [Cloud Native Computing…
26:50 Security Champions LeaderBoard - Building and Gamifying the Security Culture at Your... Aseem Shrey CNCF [Cloud Native Computing…
5:08 Lightning Talk: Don’t Make Me Impersonate My Identity - Cynthia Thomas, Google CNCF [Cloud Native Computing…
5:58 Lightning Talk: Securing Your Systems with Service Mesh - Tyler Schade, Solo.io CNCF [Cloud Native Computing…
29:44 Below the Radar: Identifying Hidden Threats Within the Development Ecosystem - Yakir Kadkoda CNCF [Cloud Native Computing…
32:37 Avengers Assemble: Threat Modeling Kubernetes Clusters at a... Sai Charan Teja Gopaluni & Jamal Arif CNCF [Cloud Native Computing…
36:07 Sigstore: Past, Present and Future Directions - Luke Hinds, Stacklok & Bob Callaway, Google CNCF [Cloud Native Computing…
34:58 Metrics That Matter: How to Choose Cloud Security KPIs for Your Business - Emma Yuan Fang CNCF [Cloud Native Computing…
28:48 Building Bridges in Open Source: Connecting Academic Talent with Indu... Ben Smith-Foley & Sam Begin CNCF [Cloud Native Computing…
29:46 CVE Context Matters, but Do All Vulnerabilities Really Matter? - Shubha Badve & Ross Tannenbaum CNCF [Cloud Native Computing…
33:17 How to Generate VEX Automatically for Your Project - Shlomo Heigh, CyberArk & Ben Hirschberg, ARMO CNCF [Cloud Native Computing…
42:41 Amplifying Impact: Documentation and Supply Chain Security - Michelle Irvine, Google Cloud CNCF [Cloud Native Computing…
36:29 Where Does Your Software (Really) Come from? - Trevor Rosen, GitHub CNCF [Cloud Native Computing…
31:30 Is the Internet on Fire? Strategies for Mitigating Open Source... Andrew Martin & Michael Lieberman CNCF [Cloud Native Computing…
30:06 Securing CI/CD Runners Through eBPF Agent - Mert Coskuner, Yahoo & Cenk Kalpakoglu, Kondukto CNCF [Cloud Native Computing…
42:14 Scan, Patch, VEX - Using Open Source Tools to Manage...Toddy Mladenov & Sertaç Özercan, Itay Shakury CNCF [Cloud Native Computing…
21:52 Learn to Navigate the Perils and Pitfalls of Multi-Tenant Identity... Fabienne Bühler & Livio Spring CNCF [Cloud Native Computing…
5:00 Sponsored Keynote: What Can You Do in 5 Minutes? - Alexander Lawrence, Field CISO, Sysdig CNCF [Cloud Native Computing…
9:06 Keynote: Welcome + Opening Remarks - Chris Aniszczyk, CTO, Cloud Native Computing Foundation CNCF [Cloud Native Computing…
37:02 Threat Modelling: How to Improve Your Kubernetes Security Posture with Threat Mod... Maxime Coquerel CNCF [Cloud Native Computing…
31:49 End-to-End Encryption for Container Checkpointing in Kubernetes - Radostin Stoyanov CNCF [Cloud Native Computing…
35:50 A Mouthful of Mayhem: Taste Test and Gut Response to SLSA, GUAC, and Supply Chain’... Shane Lawrence CNCF [Cloud Native Computing…
40:25 User Namespaces in Kubernetes: Security and Flexibility - Pick Both - David Leadbeater, G-Research CNCF [Cloud Native Computing…
32:35 The Runtime Rodeo; Where Open Source Image Behavior Is Tamed - Jimmy Mesta, RAD Security CNCF [Cloud Native Computing…
37:05 Proactive Kubernetes Security: Anomaly Detection and Runtime Alertin... Amit Schendel & Remi Minnebo CNCF [Cloud Native Computing…
25:11 Threat Modeling for AI Apps with Attacks as Code - Priyanka Tembey, Operant & Glenn McDonald CNCF [Cloud Native Computing…
31:46 Brave New World: Welcoming New AI Identity Challenges - Gabriel L. Manor, Permit.io CNCF [Cloud Native Computing…
36:42 Shadow Vulnerabilities in AI/ML Data Stacks - What You Don’t Know... Avi Lumelsky & Nitzan Mousseri CNCF [Cloud Native Computing…
16:53 Keynote: TAG Security, You're It! - Moderated by Eddie Knight, Sonatype CNCF [Cloud Native Computing…
12:27 Keynote: K8s Security Safari: Hunting Threats in the Wild Wild Cloud - Stav Ochakovski & Ariel Szarf CNCF [Cloud Native Computing…
37:44 Teach Your SBOM New Tricks with Bomshell - Adolfo García Veytia, Stacklok CNCF [Cloud Native Computing…
25:26 Drawing Lines in the Sand, or Running Unprivileged eBPF in Kubernetes - Nikola Grcevski CNCF [Cloud Native Computing…
24:09 Kubernetes Deep Dive: Elevating ML Workload Monitoring to Art - Ziwen Ning & Geeta Gharpure CNCF [Cloud Native Computing…
36:40 Leveraging Cryptographic Lineage for Context and ConnectedTrust - Yogi Porla, Deep Lineage CNCF [Cloud Native Computing…
16:24 Keynote: Security in the Open - How Industry and Community Ben... Cailyn Edwards & Jonathan Whitaker CNCF [Cloud Native Computing…
37:57 Embracing the Future: The Effortless Mutual TLS and Rich Layer 7 Authz Policy Without Sid... Lin Sun CNCF [Cloud Native Computing…
40:19 Everyone’s Starting to Look SPIFFE: MTLS and Identity with Linkerd & Teleport - Dave Sudia, Teleport CNCF [Cloud Native Computing…
19:27 Keynote: Demystifying Secure Application Communication with Zero Trust: Identity, Integri... Lin Sun CNCF [Cloud Native Computing…
22:19 One Project, Different Angles: How to Secure and Observe with Cilium - Christine Kim, Isovalent CNCF [Cloud Native Computing…
37:21 A Needle in a Haystack: How to Find a Threat Hidden in Over 6 Billion Logs Per Day - Brian Davis CNCF [Cloud Native Computing…
32:47 Network ACLs Made Easy: Establishing Zero Trust Network Policies in a Few C... Juno Im & Yonghwi Jin CNCF [Cloud Native Computing…
38:21 Shift Down Security! How Platform Teams Can Help Break the Logjam - Jim Bugwadia & Poonam Lamba CNCF [Cloud Native Computing…
39:40 Implementing a Multi-Tenant, Relationship-Based Authorizatio... Evan Anderson & María Inés Parnisari CNCF [Cloud Native Computing…
59:26 Tutorial: Automating Configuration and Management of your GitHub... Dania Valladares & Evan Anderson CNCF [Cloud Native Computing…
36:12 Container Images & Security 101: 5 Need to Know Facts - Phil Estes, AWS CNCF [Cloud Native Computing…
11:43 Keynote: A Vision for a Secure Software Supply Chain - Marina Moore, PhD Candidate, NYU CNCF [Cloud Native Computing…
10:39 Keynote: Securing Kubernetes, the Upstream Way - Rey Lejano, Solutions Architect, Red Hat CNCF [Cloud Native Computing…
37:15 How Does a Workload Authenticate an API Request?: Implementing Transaction Token... Yoshiyuki Tabata CNCF [Cloud Native Computing…
43:51 Tutorial: Hacking Istio: The Good, the Bad, and the Misconfigured - Nina Polshakova & Peter Jausovec CNCF [Cloud Native Computing…
1:04:33 Tutorial: Demystifying and Enabling Workload Identity Across the Cloud Native Ecosystem CNCF [Cloud Native Computing…
24:21 All I Know About Cybersecurity I Learned from Fungus - Alex Lawrence, Sysdig CNCF [Cloud Native Computing…
35:46 Level up Your Security Career with the TAG Security Community - Andrew Martin, ControlPlane CNCF [Cloud Native Computing…
12:02 Keynote: We’re VEXing the Cloud Native Landscape. Bring Your Code! - Adolfo García Veytia, Stacklok CNCF [Cloud Native Computing…
13:46 Keynote: Sugar Ray.io on K8s: Shut the Door, Baby! - Greg Castle & Cynthia Thomas CNCF [Cloud Native Computing…
13:16 Keynote: Security Education Through the Art of Storytelling - Ann Wallace, Okta CNCF [Cloud Native Computing…
31:02 Bridging Mesh Enclaves: Securing and Maintaining Mesh Heterogeneity - Lukonde Mwila, AWS CNCF [Cloud Native Computing…
33:33 Guardians of the Dataverse: Securing the AI Supply and Data Chain - Frederick Kautz, TestifySec Inc. CNCF [Cloud Native Computing…
32:53 Demystify Modern Signing: Keys, Certs, and Envelopes - John Kjell, TestifySec CNCF [Cloud Native Computing…
41:42 Kubernetes Node Firewalling from the Inside Out - Jef Spaleta & Justin Garrison CNCF [Cloud Native Computing…
36:46 The Story of Crush: The Microservice That Navigated the Cloud Native O... Mattias Gees & Tom Meadows CNCF [Cloud Native Computing…
35:31 IAM Confused: Decoding 8 Real World Cloud Identity Breaches - Maya Levine, Sysdig CNCF [Cloud Native Computing…
1:12:26 Tutorial: Sailing the Security Seas with Tetragon - Duffie Cooley, Isovalent CNCF [Cloud Native Computing…
37:51 From Risks to Resilience: Leveraging CNCF Projects Against Kube... Alireza Rahmani & Hilliary Lipsig CNCF [Cloud Native Computing…
40:06 Cloud Native GRC - Brandt Keller, Defense Unicorns & Jon Zeolla, Zenable CNCF [Cloud Native Computing…
35:08 Implementing AI RMF with Policy-as-Code Automation - Robert Ficcaglia, Anca Sailer & Vikas Agarwal CNCF [Cloud Native Computing…