32:12 Real Time Security - eBPF for Preventing attacks - Liz Rice, Isovalent CNCF [Cloud Native Computing…
20:29 Putting the Supply Chain Pieces together: A Deep Dive into the Secure softwar... Michael Lieberman CNCF [Cloud Native Computing…
36:01 Fuzzing the CNCF Landscape - Adam Korczynski & David Korczynski, Ada Logics CNCF [Cloud Native Computing…
23:11 Securing the Supply Chain with Witness - Cole Kennedy, TestifySec CNCF [Cloud Native Computing…
30:45 VEX! or... How to Reduce CVE Noise With One Simple Trick! - Frederick Kautz CNCF [Cloud Native Computing…
11:08 Lightning Talk: Repurposed Purpose: Using Git's DAG for Supply Chain Artifact Resolution- Aeva Black CNCF [Cloud Native Computing…
34:48 Using CNCF Best Practices for Software Supply Chain to Guide and Enha... Ryan Gibbons & Conor Rogers CNCF [Cloud Native Computing…
26:34 Security Champions: The What, Why, and How - Ann Marie Fred, Red Hat CNCF [Cloud Native Computing…
25:10 Towards the Hardened Cloud-Native Cornerstone: Container Runtime Protection from Secur... Kailun Qin CNCF [Cloud Native Computing…
29:47 Shrinking Software Attack Surface with WebAssembly & CNCF Wasmcloud - Liam Randall, Cosmonic CNCF [Cloud Native Computing…
26:23 Protect the Pipe! A Policy-based Approach for Securing CI/CD Pipe... Shripad Nadgowda & Jim Bugwadia CNCF [Cloud Native Computing…
23:38 Purple Teaming Like Sky’s the Limit – Adversary Emulation in the Cloud... Christophe Tafani-Dereeper CNCF [Cloud Native Computing…
1:20:56 First Steps to Full Lifecycle Security with Open Source Tools - Rory McCune & Anais Urlichs CNCF [Cloud Native Computing…
11:57 Keynote: DevSecOps and the Art of Not Ending Up On the Front Page- Fabio Rapposelli, VMware Tanzu CNCF [Cloud Native Computing…
9:03 Lightning Talk: What’s Inside Your Container Image? How to Audit All the Dependencies... Steve Judd CNCF [Cloud Native Computing…
27:37 Dissecting the Discovery of the 0-Day Supply Chain Vulnerability in Argo CD - Moshe Zioni, Apiiro CNCF [Cloud Native Computing…
8:21 Lighting Talk: Lessons Learned from Writing Thousands of Lines of IaC - Eran Bibi, Firefly CNCF [Cloud Native Computing…
9:56 Lightning Talks: Detecting Data Exfiltration on the Edge with Pixie - Zain Asgar, New Relic CNCF [Cloud Native Computing…
27:47 Vanquishing Vulnerabilities in Valencia - Alba Ferri Fitó, Sysdig & Eric Smalling, Synk CNCF [Cloud Native Computing…
7:59 Keynote: Why Wait? Find Cloud Risks and Threats in Real Time with Stream Detection - Loris Degioanni CNCF [Cloud Native Computing…
9:56 Lightning Talk: What Have We Learned from Scanning Over 10K Unique Clusters with Ku... Shauli Rozen CNCF [Cloud Native Computing…
14:01 Lightning Talk: lockc - Containing the Containers That Do Not Contain - Michal Rostecki CNCF [Cloud Native Computing…
14:13 Closing + CTF Wrap Up- Brandon Lum, Google; Andy Martin, ControlPlane CNCF [Cloud Native Computing…
21:45 Top 5 Reasons (and 5 Myths Debunked) to Invest in Securing the Software Supply Chain- Hector Linares CNCF [Cloud Native Computing…
9:55 Lightning Talk: Knowing Your Serverless Functions: Signing and Verifying Serverless... Ariel Shuper CNCF [Cloud Native Computing…
6:19 Keynote: Evolutions in data privacy: threats and opportunities -Kirsten A. Newcomer, Red Hat CNCF [Cloud Native Computing…