1:13:23 Tutorial: Hands-on Hacking Kubernetes and Ways to Prevent It - Eric Smalling, Snyk CNCF [Cloud Native Computing…
40:53 Securing Self-Hosted GitHub Actions with Kubernetes & Actions-Runner-Controller - Natalie Somersall CNCF [Cloud Native Computing…
31:24 Self Healing GitOps: Continuous, Secure GitOps Using Argo CD, Helm and OPA - Upkar Lidder , Tenable CNCF [Cloud Native Computing…
38:39 On Establish a Production Zero Trust Architecture - Frederick Kautz, SPIFFE/SPIRE CNCF [Cloud Native Computing…
40:00 How to Secure Your Supply Chain at Scale - Hemil Kadakia & Yonghe Zhao, Yahoo CNCF [Cloud Native Computing…
16:35 Keynote: Welcome + Opening Remarks - Priyanka Sharma, Executive Director, CNCF CNCF [Cloud Native Computing…
14:07 Keynote: The Next Steps in Software Supply Chain Security - Brandon Lum, Software Engineer, Google CNCF [Cloud Native Computing…
36:23 Spicing up Container Image Security with SLSA & GUAC - Ian Lewis, Google CNCF [Cloud Native Computing…
32:57 So You Want to Run Your Own Sigstore: Recommendations for a Secure Setup - Hayden Blauzvern, Google CNCF [Cloud Native Computing…
34:22 Cloud Native Security 101: Building Blocks, Patterns and Best Practices - Rafik Harabi, Sysdig CNCF [Cloud Native Computing…
12:44 Keynote: Learn by Hacking: How to Run a 2,500 Node Kubernetes CTF - Andrew Martin & Andrés Vega CNCF [Cloud Native Computing…
37:24 Zero Trust Workload Identity in Kubernetes - Michael Peters, Red Hat CNCF [Cloud Native Computing…
33:19 Zero Trust in the Cloud with WebAssembly and WasmCloud - Kevin Hoffman, Cosmonic CNCF [Cloud Native Computing…
41:30 Security Threat Modeling Live from Scratch Session - Andrew Martin, Control Plane CNCF [Cloud Native Computing…
36:20 Securing the Superpowers: Who Loaded That EBPF Program? - John Fastabend & Natalia Reka Ivanko CNCF [Cloud Native Computing…
37:07 Security as Code: A DevSecOps Approach - Xavier René-Corail, GitHub CNCF [Cloud Native Computing…
38:31 Finding the Needles in a Haystack: Identifying Suspicious Behaviors... Jeremy Cowan & Wasiq Muhammad CNCF [Cloud Native Computing…
32:57 CNI or Service Mesh? Comparing Security Policies Across Providers - Rob Salmond & Christine Kim CNCF [Cloud Native Computing…
11:07 Keynote: Picture this! Solving Security Problems Visually with eBPF - Liz Rice, Isovalent CNCF [Cloud Native Computing…
4:48 Sponsored Keynote: From Google to NIST — The Future of Cloud Native Security - Zack Butcher, Tetrate CNCF [Cloud Native Computing…
42:30 12 Essential Requirements for Policy Enforcement and Governance with OSCAL - Robert Ficcaglia CNCF [Cloud Native Computing…
13:56 Keynote: Back to the Future: Next-Generation Cloud Native Security - Matt Jarvis, Snyk CNCF [Cloud Native Computing…
35:39 Modifying the Immutable: Attaching Artifacts to OCI Images - Brandon Mitchell, BoxBoat CNCF [Cloud Native Computing…
13:32 84 The Four Golden Signals of Security Observability - Duffie Cooley, Isovalent CNCF [Cloud Native Computing…
39:33 Securing User to Service Access in Kubernetes - Maya Kaczorowski & Maisem Ali, Tailscale CNCF [Cloud Native Computing…
33:45 Who Are You? I Really Want to Know… the Magic Behind OIDC - Eddie Zaneski, Chainguard CNCF [Cloud Native Computing…
1:22:55 Tutorial: How to Build a K8s Admission Controller fro... Stephen Giguere, Angela Gizzi, Matt Johnson CNCF [Cloud Native Computing…
38:02 Identity Based Segmentation for a ZTA - Zack Butcher, Tetrate & Ramaswamy Chandramouli, NIST CNCF [Cloud Native Computing…
41:37 Container Patching: Making It Less Gross Than the Seattle Gum Wall - Greg Castle & Weston Panther CNCF [Cloud Native Computing…
17:20 Keynote: Fighting The Next War - Future Threats to OSS and Software Supply Chain... Brian Behlendorf CNCF [Cloud Native Computing…
24:56 Handling JWTs: Understanding Common Pitfalls - Bruce MacDonald, InfraHQ CNCF [Cloud Native Computing…
31:17 Network Security at Scale: L3 Through L7 at Splunk - Mitch Connors & Bernard Van De Walle CNCF [Cloud Native Computing…
40:32 Avoiding IAC Potholes with Policy + Cloud Controllers - Andrew Martin, ControlPlane CNCF [Cloud Native Computing…
34:04 Package Transparency for WebAssembly Registries - Kyle Brown, SingleStore CNCF [Cloud Native Computing…
38:46 CSI Container: Can You DFIR It? - Alberto Pellitteri & Stefano Chierici, Sysdig CNCF [Cloud Native Computing…
37:28 What's a Zero-Trust Tunnel? Exploring Security and Simpler Operations w... Jim Barton & Marino Wijay CNCF [Cloud Native Computing…
25:36 Leveraging SBOMS to Automate Packaging, Transfer, and Reporting of D... Ian Dunbar-Hall & Jerod Heck CNCF [Cloud Native Computing…
35:34 From the Cluster to the Cloud: Lateral Movements in Kubernetes - Yossi Weizman & Ram Pliskin CNCF [Cloud Native Computing…
39:52 Verifiable GitHub Actions with eBPF - Jose Donizetti & Itay Shakury, Aqua Security CNCF [Cloud Native Computing…
5:11 Sponsored Keynote: Cloud Security’s Hidden Force: Threat Detection - Loris Degioanni, Sysdig CNCF [Cloud Native Computing…
35:23 Standardization & Security - A Perfect Match - Ravi Devineni & Vinny Carpenter, Northwestern Mutual CNCF [Cloud Native Computing…
3:29 Lightning Talk: My First Supply Chain Security Pull Request as a 13-Year-Old - Neil Naveen CNCF [Cloud Native Computing…
26:49 How Do You Trust Your Open Source Software? - Naveen Srinivasan, Endor Labs & Brian Russell, Google CNCF [Cloud Native Computing…
36:01 Not All That’s Signed Is Secure: Verify the Right Way with TUF and... Zachary Newman & Marina Moore CNCF [Cloud Native Computing…
5:49 Sponsored Keynote: Why Developer Laptop Security is Key to Securing Your CI/CD Pip... Saurabh Wadhwa CNCF [Cloud Native Computing…
39:13 Delivering Secure Healthcare Applications with OSS - Robert Wood & Gedd Johnson CNCF [Cloud Native Computing…
31:04 Sharing Security Secrets: How to Encourage Security Advocates - Cailyn Edwards, Shopify CNCF [Cloud Native Computing…
5:59 Sponsored Keynote: Kubernetes is the Perfect Platform for Enforcing Zero Trust Security - Fei Huang CNCF [Cloud Native Computing…
37:38 Improving Secure Pod-to-Pod Communication Within Kubernetes Using... Thomas Edward Hahn & Mark Hahn CNCF [Cloud Native Computing…
5:57 Sponsored Keynote: Trust and Risk in the Software Supply Chain - Emmy Eide, Red Hat CNCF [Cloud Native Computing…
33:12 Beyond Cluster-Admin: Getting Started with Kubernetes Users and Permissions - Tiffany Jernigan CNCF [Cloud Native Computing…
32:32 Solving Multi-Service Without a Service Mesh - Evan Anderson, VMware CNCF [Cloud Native Computing…
30:46 OmniBOR: Bringing the Receipts for Supply Chain Security - Frederick Kautz, SPIFFE/SPIRE CNCF [Cloud Native Computing…
32:23 Do This, Not That – Lessons from 7 Headline Grabbing Security Breaches - Maya Levine, Sysdig CNCF [Cloud Native Computing…
28:57 More Than Just a Pretty Penny! Why You Need Cybersecurity in... Callan Andreacchi & Michaela Flatau CNCF [Cloud Native Computing…
26:00 Cryptographic Agility: Preparing Modern Apps for Quantum Safety and Beyond - Natalie Fisher, VMware CNCF [Cloud Native Computing…
28:34 From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native - Mor Weinberger CNCF [Cloud Native Computing…
14:23 Keynote: Panic in San Francisco: The Critical Vulnerability That Wasn't - Shane Lawrence, Shopify CNCF [Cloud Native Computing…
29:56 Taming Attestation for the Cloud Native World with Parsec - Paul Howard, Arm CNCF [Cloud Native Computing…
27:13 Security++: Hide Your Secrets via a Distributed Hardware Security Mod... Iris Ding & Malini Bhandaru CNCF [Cloud Native Computing…
44:21 Yes, Application Security Leads to Better Business Value. Learn How from Experts. CNCF [Cloud Native Computing…
34:38 Journey to Cloud-Native, K8s and Trying to Secure It. - Graham E. Chukwumaobi, Independent CNCF [Cloud Native Computing…
34:12 Unpacking Open Source Security in Public Repos & Registries - Ben Hirschberg, ARMO CNCF [Cloud Native Computing…
4:48 Lightning Talk: A Secure Software Supply Chain for Open Policy Agency (OPA) Policies - Omri Gazitt CNCF [Cloud Native Computing…
19:28 TAG Security Cloud Native Security Whitepapers Overview - Shlomo Zalman Heigh, CyberArk CNCF [Cloud Native Computing…
6:00 Sponsored Keynote: OpenClarity: A Community-Led Approach to Cloud-Native Applicat... Sarabjeet Chugh CNCF [Cloud Native Computing…
20:57 Securing Diverse Supply Chains Across Interconnected Systems - Wayne Starr & Aaron Creel CNCF [Cloud Native Computing…
2:11 Keynote: Closing Remarks - Emily Fox, Apple; Liz Rice, Isovalent; Brandon Lum, Google CNCF [Cloud Native Computing…
30:05 Learning from Supply Chain Failures and Best Practices in Other Industries - Demian Ginther CNCF [Cloud Native Computing…
26:40 Get Your Security Priorities Straight! How to Identify Workloads Und... Ben Hirschberg & Arie Haenel CNCF [Cloud Native Computing…
24:46 Let’s Talk Software Supply Chains with TAG Security - Michael Lieberman, Kusari CNCF [Cloud Native Computing…
26:42 Security Does Not Need to Be Fun: Ignoring OWASP to Have a Terrible Time - Dwayne McDaniel CNCF [Cloud Native Computing…
29:23 Container Factory for Aerospace & Defense Enterprises - Sarah Miller & Melissa Robertson CNCF [Cloud Native Computing…
4:29 Lightning Talk: Securing Your Source Repositories - 5 Tips to Get Started! - Billy Lynch, Chainguard CNCF [Cloud Native Computing…
27:22 When SysAdmins Quit: Protecting Kubernetes Clusters When the Owner of Multiple... Arun Krishnakumar CNCF [Cloud Native Computing…
20:32 Security That Enables: Breaking Down Security Silos in the DevOps Ecosystem - Saurabh Wadhwa, Uptycs CNCF [Cloud Native Computing…
5:48 Lightning Talk: Cloud(Security)Events -- A Lightweight Framework for Security React... Evan Anderson CNCF [Cloud Native Computing…
1:10 Keynote: Closing Remarks - Emily Fox, Apple; Liz Rice, Isovalent; & Brandon Lum, Google CNCF [Cloud Native Computing…
0:29 Keynote: Opening Remarks - Liz Rice, Chief Open Source Officer, Isovalent CNCF [Cloud Native Computing…
10:41 Keynote: It Takes a Community to Raise a Conference: From Security Day to CloudNativeSe... Emily Fox CNCF [Cloud Native Computing…
38:01 Good Fences Make Good Neighbors: Making Cross-Namespace References More Secure with Re... Nick Young CNCF [Cloud Native Computing…
5:00 Lightning Talk: Software Dark Matter is the Enemy of Software Transparency - Santiago Torres-Arias CNCF [Cloud Native Computing…
17:29 A Sneak Peak Into Security Reviews with the Community - Ragashree MC, Carnegie Mellon University CNCF [Cloud Native Computing…
40:41 Mapping Motives Tells a Story: Analysis of 2,000 Enterprise Cloud Detec... David Wolf & Joshua Smith CNCF [Cloud Native Computing…