7
0
Fork 0

Meerdere talks NJ2019 toegevoegd

This commit is contained in:
Patrick Reijnen 2023-07-22 21:36:45 +02:00
parent 8f8f5a6672
commit 4183483b76
5 changed files with 98 additions and 4 deletions

View file

@ -77,7 +77,7 @@ event_schedule:
speaker: David Blank-Edelman speaker: David Blank-Edelman
title: "SRE101: Lessons from a Parallel Universe" title: "SRE101: Lessons from a Parallel Universe"
keynote: true keynote: true
link: link: talks/david-blank-edelman-sre101-lessons-from-a-parallel-universe/
center: true center: true
size: 3 size: 3
- row: - row:
@ -97,7 +97,7 @@ event_schedule:
talk: talk:
speaker: Andreas Hülsing speaker: Andreas Hülsing
title: Post-quantum cryptography title: Post-quantum cryptography
link: link: talks/andreas-hulsing-post-quantum-cryptography/
- column: - column:
talk: talk:
speaker: Moritz Müller speaker: Moritz Müller
@ -154,7 +154,7 @@ event_schedule:
talk: talk:
speaker: Bram Cappers speaker: Bram Cappers
title: "Eventpad: Cybercrime Analysis Using Visual Analytics" title: "Eventpad: Cybercrime Analysis Using Visual Analytics"
link: link: talks/bram-cappers-eventpad-cybercrime-analysis-using-visual-analytics/
- column: - column:
talk: talk:
speaker: Koen de Jonge speaker: Koen de Jonge

View file

@ -0,0 +1,34 @@
---
categories:
- presentaties
date: 2023-07-03T10:31:43+02:00
description: ""
layout: event-talk
tags:
- shell
- scripting
title: "Andreas Hülsing - Post-quantum cryptography"
speakers:
- andreas-hulsing
presentation:
filename: 2019-11-21-andreas-hulsing-post-quantum-cryptography.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=hebljeD0Ngw
---
## Abstract
As soon as large scale quantum computers are built today's cryptography does not provide security anymore. This threatens the security of our digital society. Even worse: For some data that we send or store in encrypted form we want secrecy to hold for our whole lifetime, if not longer. Think of medical data for example. This data can be stored and decrypted when a quantum computer is available.
Post-quantum cryptography is the study of conventional cryptography in the presence of an adversary with access to a quantum computer. In this talk I will give an overview of the landscape of schemes submitted to the recent NIST standardization project. I will discuss the underlying problems and summarize the current knowledge about quantum algorithms to solve them.
In addition, I will touch on challenges in the area of provable post-quantum security.
## Biography
I am assistant professor in the Coding Theory and Cryptology group at Eindhoven University of Technology (TU/e). My research focuses on post-quantum cryptography — cryptography that resists quantum computer-aided attacks. My works range from theoretical works, like how to model quantum attacks or formal security arguments in post-quantum security models, to applied works, like the analysis of side-channel attacks or the development of efficient hash-based signature schemes. In many of my works I try to combine the theoretical and the applied perspective. This is especially reflected in my work on standardizing post-quantum cryptography.
Before my current position, I was a postdoctoral researcher in the Coding Theory and Cryptology group, working with Tanja Lange in the PQCRYPTO project. Before I was a postdoctoral researcher in the cryptographic implementations group at TU/e, working with Daniel J. Bernstein. I did my PhD in the cryptography and computer algebra group at TU Darmstadt under the supervision of Johannes Buchmann.
Before starting my PhD, I worked as a research fellow at Fraunhofer SIT in Darmstadt. I hold a Diploma in computer science from TU Darmstadt.

View file

@ -0,0 +1,30 @@
---
categories:
- presentaties
date: 2023-07-03T10:31:43+02:00
description: ""
layout: event-talk
tags:
- shell
- scripting
title: "Bram Cappers - Eventpad: Cybercrime Analysis Using Visual Analytics"
speakers:
- bram-cappers
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=TJixUQhU-lY
---
## Abstract
Automation of malware analysis is a popular and very important topic, but with human cognition still outperforming AI we are still indispensable. In this talk we show how we can exploit the human eye for the analysis of large PCAP files and event logs using visual analytics.
At the TU/e we designed a system Eventpad to quickly visualize patterns and anomalies in event collections. In this talk we give live demos on how we can use the tool to discover fraud in VoIP traffic, discover chemical waste dumping in a wildlife preserve and reverse engineer Ransomware in back office environments.
## Biography
Bram Cappers is a postdoctoral researcher at Eindhoven University of Technology and cofounder of the startup AnalyzeData. In 2018 he finished his PhD in the area of data visualization and cyber security. where he developed new antivirus technology to visually detect patterns and anomalies in network traffic.
Bram has won numerous awards in the area of data science and presented his technology at prestigious events such as BlackHat USA 2018 and Still Hacking Anyway 2017.

View file

@ -0,0 +1,30 @@
---
categories:
- presentaties
date: 2023-07-03T10:31:43+02:00
description: ""
layout: event-talk
tags:
- shell
- scripting
title: "David Blank-Edelman - SRE101: Lessons from a Parallel Universe"
speakers:
- david-blank-edelman
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=oKnc8rcg1H0
---
## Abstract
Just within the last fifteen years, we have seen at least two separate communities evolve from the generic idea of Systems Administration/Operations. The first, DevOps, grew up very much in public. The second, SRE, germinated within the halls of “special” companies like Google and Facebook and is now starting to gain significant visibility and traction in the wider world.
Join me for an introduction to SRE: what it is, why it matters, how it relates to other operations practices like DevOps, and if/how you can get started with it in your organization.
## Biography
David has over thirty years of experience in the systems administration/DevOps/SRE field in large multiplatform environments. He is the curator/editor of the O'Reilly Book Seeking SRE: Conversations on Running Production Systems at Scale and author of the O'Reilly Otter Book (Automating Systems Administration with Perl).
David is a co-founder of the wildly popular SREcon conferences hosted globally by USENIX. David currently works for Microsoft as a senior cloud advocate focusing on site reliability engineering.

View file

@ -23,7 +23,7 @@ Whether you call yourself a system administrator, developer, or DevOps sprint me
Focus areas of this presentation include error handling, security, style, and best practices. Also, it will cover (many) mistakes made by Michael over the last 20 years. Got some of your own? They are welcome as part of the discussion. Focus areas of this presentation include error handling, security, style, and best practices. Also, it will cover (many) mistakes made by Michael over the last 20 years. Got some of your own? They are welcome as part of the discussion.
## Biografie ## Biography
Michael Boelen specializes in the field of Linux and UNIX security. He worked as a consultant for several Fortune 500 companies like Philips and ASML. In 2013, Michael started the security firm CISOfy to simplify security. Michael Boelen specializes in the field of Linux and UNIX security. He worked as a consultant for several Fortune 500 companies like Philips and ASML. In 2013, Michael started the security firm CISOfy to simplify security.