7
0
Fork 0

De laatste set aan NJ2018 talks toegevoegd

This commit is contained in:
Patrick Reijnen 2023-12-29 16:06:00 +01:00
parent 94e46e534d
commit d88b3ce62d
7 changed files with 195 additions and 6 deletions

View file

@ -122,17 +122,17 @@ event_schedule:
talk:
speaker: Olaf Molenveld
title: "How to use smart canary releasing for containers to increase velocity and reduce issues"
link:
link: talks/olaf-molenveld-how-to-use-smart-canary-releasing-for-containers-to-increase-velocity-and-reduce-issues/
- column:
talk:
speaker: Dag Wieers
title: "Managing complex infrastructure in lab environments using Ansible"
link:
link: talks/dag-wieers-managing-complex-infrastructures-in-lab-environments-with-ansible/
- column:
talk:
speaker: Tom Tervoort
title: "The road to TLS 1.3"
link:
link: talks/tom-tervoort-the-road-to-tls-13/
- row:
columns:
- column:
@ -169,7 +169,7 @@ event_schedule:
talk:
speaker: Slawek Wojtczak
title: ZFS Boot Environments
link:
link: talks/slawek-wojtczak-zfs-boot-environments/
- row:
columns:
- column:
@ -193,7 +193,7 @@ event_schedule:
talk:
speaker: Arjan Widlak
title: The Digital Cage
link:
link: talks/arjan-widlack-the-digital-cage/
- row:
columns:
- column:
@ -221,7 +221,7 @@ event_schedule:
talk:
speaker: Mischa Peters
title: What Every Security Professional Should Know About the Dark Web
link:
link: talks/mischa-peters-what-every-security-professional-should-know-about-the-dark-web/
- row:
columns:
- column:

View file

@ -0,0 +1,31 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- information-architecture
title: "Arjan Widlack - The Digital Cage"
speakers:
- arjan-widlack
presentation:
filename:
recording:
platform: youtube
url: https://www.youtube.com/watch?v=gTL3-VaF89Q
---
## Abstract
In the Digital Cage we follow three Dutch citizens, Saskia, Pieter and Esther, who seem to have been struck by fate. Saskia is obliged to have her stolen car inspected. Because she cannot comply, she is haunted by government with fines and gets into debt. If model-citizen Esther is abroad too often for her work, she loses almost everything, from her parking permit to her voting rights. Like in a Kafka-novel we discover how registries and data exchange are no neutral actors, but that we have build with ignorance and negligence a digital cage that keeps larger and larger groups invisibly imprisoned.
The sharing of information is the backbone of government services today. However we have lost control. We do not know how uses these data and we have no idea about the consequences of an error in registration. In this talk Arjan shows how the information architecture has rendered government blind for the problems it causes with citizens and is unable to correct errors.
The Digital Cage is a book published earlier this year, written by Arjan Widlak and Rick Peeters on maladministration (onbehoorlijk bestuur) caused by information architecture and one of a series of papers. This lecture is an introduction into this theme. The book also contains the "ten principles of good digital government" to give the citizen a voice and central place again in the digital government. It's a must-read for every government professional.
## Biography
Arjan Widlak is director and researcher at the Kafka Brigade Foundation. The Kafka Brigade is an action research organization that aims to tackle bureaucratic dysfunction and red tape which prevents people from accessing the services they need and which constrains and frustrates public service staff. The Kafka Brigade Netherlands coordinates the sister organizations and associated researchers in several countries.
Arjan is developer of several serious games concerning complex decision making. His simulations are used by businesses, governments and universities in various countries. He teaches in several program's and masterclasses about wicked problems, standardization, negotiation and ICT and the transformation of government.

View file

@ -0,0 +1,31 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- ansible
title: "Dag Wieers - Managing complex infrastructures in lab environments with Ansible"
speakers:
- dag-wieers
presentation:
filename: 2018-11-15-dag-wieers-managing-complex-infrastructures-in-lab-environments-with-ansible.pdf
recording:
platform: youtube
url:
---
## Abstract
This presentation looks at how we started managing lab environments in a Cisco TAC support team. We will look into the specific requirements for lab environments to better support teams and customers. We will visit the business case and eventually the technical solution and end-up with using Ansible.
This presentation touches Linux, Windows, network automation, and also hardware devices and other interfaces that may not have been designed for automation.
Warning: attendants to this presentation may be exposed to flashes of YAML, Jinja, Python, and PowerShell. The faint of heart should probably skip this session.
## Biography
Dag Wieers is a freelance Linux and Open Source consultant, having worked for various international companies (mostly, in technology, banking, broadcasting and telecom markets).
His main competencies include architecting and automating workflow, systems management, documentation and knowledge transfer and leading technical teams. He loves lightweight processes and keeping it simple.

View file

@ -0,0 +1,33 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- security
- dark-web
title: "Mischa Peters - What Every Security Professional Should Know About the Dark Web"
speakers:
- mischa-peters
presentation:
filename:
recording:
platform: youtube
url:
---
## Abstract
Turn on the nightly news or your favorite TV drama and youre bound to hear mentions of a vast criminal underworld for drugs, sex, guns, and identity theft hidden in plain site - all you need is a computer or mobile device to get there - this is the dark web. But what is the dark web really?
While well known, fewer than 1% of internet users have visited the dark web and even among IT security professionals, only 1 in 7 have ever ventured to a dark web forum or site. This lack of direct experience helps explain why there is so much fear and misinformation being spread. But it also suggests that many in the security industry are missing out on a crucial source of information that could help them better protect their enterprise and better get inside the mind of a hacker.
In this talk, we hope to use our knowledge to help break apart fact from fiction and provide you with the basics you, as a security professional, will need to begin safely leveraging this growing intelligence resource to better protect your organization.
## Biography
Mischa Peters is Director Systems Engineering EMEA with IntSights. He has been in the industry for more than 20 years and began his career at one of the leading Internet Service Providers in the Netherlands, XS4ALL. After XS4ALL he worked for companies like Livingston/Lucent, Foundry/Brocade, A10 Networks and LightCyber.
His knowledge has evolved with the emergence of the Web and the need to secure it all and gained vast experience in this subject, with companies such as BlueCoat and LightCyber and currently IntSights. IntSights being positioned as a leader in the field of Dark Web and Cyber Risk Intelligence.
In his former life, he was helping teams designing, building and releasing innovative online and e-commerce focused platforms for digital enterprises. In his role of CTO of Vamp.io he is focusing on envisioning and realising the architecture, technology and features of Vamp, consultative business development, and defining and refining the vision of Vamps value in the ever-changing DevOps space.

View file

@ -0,0 +1,32 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- containers
- canary-releasing
title: "Olaf Molenveld - How to use smart canary releasing for containers to increase velocity and reduce issues"
speakers:
- olaf-molenveld
presentation:
filename: 2018-11-15-olaf-molenveld-how-to-use-smart-canary-releasing-for-containers-to-increase-velocity-and-reduce-issues.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=-8enRR4poKU
---
## Abstract
Adopting new technologies like Docker containers, microservices, Mesos/Marathon, Kubernetes and other “cloud native” solutions, not only creates huge possibilities to increase velocity and scalability, but also introduces a whole new level of complexity. How to implement continuous delivery, service discovery, log-agreggation, API orchestration and secure exposing of service API's and applications? These are all non-trivial challenge which need to be solved before one can safely go to production with such an modern cloud-native stack.
A solution that can handle these requirements in an integrated and unified way can provide great value. It cannot only provide a single “pane of glass” to the underlying components and make them work together efficiently, it can also apply smart metric-driven automation workflows to provide advanced features like canary-relasing, feature-A/B testing and runtime optimisations like SLA based autoscaling.
In this talk, Olaf Molenveld, co-founder and CTO of Vamp.io, will demonstrate how smart service discovery, load balancing, canary releasing, feature testing and autoscaling can be quickly applied to a container scheduler using a unified system.
## Biography
Olaf has over 20 years of experience in the internet industry in various technical, architectural and managerial roles. With a background as a software developer, solutions architect and technical consultant, Olaf is in a good position to align business challenges with technical innovations and organisational processes.
In his former life, he was helping teams designing, building and releasing innovative online and e-commerce focused platforms for digital enterprises. In his role of CTO of Vamp.io he is focusing on envisioning and realising the architecture, technology and features of Vamp, consultative business development, and defining and refining the vision of Vamps value in the ever-changing DevOps space.

View file

@ -0,0 +1,33 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- zfs
title: "Slawek Wojtczak - ZFS Boot Environments"
speakers:
- slawek-wojtczak
presentation:
filename: 2018-11-15-slawek-wojtczak-zfs-boot-environments.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=6cpfKodHW00
---
## Abstract
As long as sysadmins need to maintain, change and update operating systems there is always need to protect against problems that may occur during these operations. Various solutions were used starting from simple backup/restore procedures or copying the contents of system filesystems into spare disks to snapshots and clones recently. None of these solutions were transparent enough or bulletproof enough to provide complete and consistent protection again failures in the change or update process.
One of such holy grails is ZFS Boot Environments solution. It protects entire system (and even additional data when needed) against almost any change or update process. As ZFS Boot Environments matured in Solaris/Illumos systems and then on FreeBSD UNIX other systems started to copy its principles to provide similar solutions such as snapper with BTRFS in SUSE or Boot Environment Manager for DragonFly BSD with their HAMMER filesystem.
The presentation aims to walk through the history of these solutions with the focus on practical ZFS Boot Environments solutions and examples.
## Biography
I have used FreeBSD for more then 13 years both privately and professionally along with various other UNIX and UNIX-like systems. Besides UNIX systems I put a lot of interest in storage, high availability solutions, virtualization/containers and backup/restore solutions showed on my LinkedIn page. I am also available via Twitter and Mastodon.
Recently I started a blog where I share knowledge and experience that I gathered by working 10+ years as sysadmin (now architect) at IT industry. Countless times various articles or blog posts helped me, so I though that its about time to give back. If you want to read more you may check My FreeBSD Story at my blog.
Arjan is developer of several serious games concerning complex decision making. His simulations are used by businesses, governments and universities in various countries. He teaches in several program's and masterclasses about wicked problems, standardization, negotiation and ICT and the transformation of government.

View file

@ -0,0 +1,29 @@
---
categories:
- presentaties
date: 2018-11-15T10:31:43+02:00
description: ""
layout: event-talk
tags:
- tls-13
title: "Tom Tervoort - The road to TLS 1.3"
speakers:
- tom-tervoort
presentation:
filename: 2018-11-15-tom-tervoort-the-road-to-tls-13.pdf
recording:
platform: youtube
url: https://www.youtube.com/watch?v=L1wFkKOzp6M
---
## Abstract
Since it was quickly cobbled together by Netscape in order to allow people to buy items over the web, the SSL/TLS protocol has become one of the most popular protocols for secure communications. Unfortunately, designing a cryptographic protocol that satisfied everyone's needs turned out to be more complex than anticipated, causing the large number of vulnerabilities which plaged each version of it so far.
This talk will cover the evolution of SSL and TLS, and how mistakes from the past informed the design of its newest incarnation: TLS 1.3. It will also examine the new protocols' considerable improvements in robustness, security and efficiency, and the issues that still remain.
## Biography
Tom is a security specialist (i.e. ethical hacker and consultant) at Secura and a PhD student (in the field of medical security) at the AMC hospital. He frequently perform security investigations of complex and unorthodox systems such as cryptographic protocols, identity management systems and blockchain applications.
Tom worked as a software developer before entering the security field, and received a master's degree in computing science (specialising in programming technology and automatic protocol verification) from Utrecht University.