Eerste invulling sprekers en titels van presentaties
This commit is contained in:
parent
a67dab4d07
commit
1d69bab0aa
|
@ -22,7 +22,7 @@ event_address:
|
||||||
event_members_only: true
|
event_members_only: true
|
||||||
event_schedule:
|
event_schedule:
|
||||||
title: Programma
|
title: Programma
|
||||||
description: Alleen maar geweldige sprekers
|
description:
|
||||||
columns: 4
|
columns: 4
|
||||||
headers:
|
headers:
|
||||||
- header:
|
- header:
|
||||||
|
@ -64,8 +64,8 @@ event_schedule:
|
||||||
time: 09:30
|
time: 09:30
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Lucinda Sterk
|
||||||
title: nog niet bekend
|
title: Talk nerdy to me
|
||||||
keynote: true
|
keynote: true
|
||||||
link:
|
link:
|
||||||
center: true
|
center: true
|
||||||
|
@ -85,17 +85,17 @@ event_schedule:
|
||||||
time: 11:00
|
time: 11:00
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Riccardo ten Cate en Glenn ten Cate
|
||||||
title:
|
title: Exploitation, automation, mitigation
|
||||||
link:
|
link:
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Mike Ciavarella
|
||||||
title:
|
title: This is just temporary
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Melchior Aelmans
|
||||||
title:
|
title: Exploring quantum Technology for Networking
|
||||||
- row:
|
- row:
|
||||||
columns:
|
columns:
|
||||||
- column:
|
- column:
|
||||||
|
@ -108,16 +108,16 @@ event_schedule:
|
||||||
time: 11:50
|
time: 11:50
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Rob Hulsebos
|
||||||
title:
|
title: OT Cybersecurity Challenges
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Michiel Leenaars
|
||||||
title:
|
title: NLnet and NGI Zero: working for the internet
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Sake Blok
|
||||||
title:
|
title: LOG4SHELL: Getting to know your adversary
|
||||||
- row:
|
- row:
|
||||||
columns:
|
columns:
|
||||||
- column:
|
- column:
|
||||||
|
@ -127,33 +127,22 @@ event_schedule:
|
||||||
text: Lunch
|
text: Lunch
|
||||||
center: true
|
center: true
|
||||||
size: 3
|
size: 3
|
||||||
- row:
|
|
||||||
columns:
|
|
||||||
- column:
|
|
||||||
time: 13:10
|
|
||||||
- column:
|
|
||||||
- column:
|
|
||||||
textfield:
|
|
||||||
text: NLUUG Algemene Ledenvergadering (ALV)
|
|
||||||
link: https://nluug.nl/leden/alv/2023vj/
|
|
||||||
center: true
|
|
||||||
- column:
|
|
||||||
- row:
|
- row:
|
||||||
columns:
|
columns:
|
||||||
- column:
|
- column:
|
||||||
time: 14:00
|
time: 14:00
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Francisco Dominguez and Zawadi Done
|
||||||
title:
|
title: Automating incindent response should be the default
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Andreas Hülsing
|
||||||
title:
|
title: An update on NIST's PQC standardization process
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Kris Buytaert
|
||||||
title:
|
title: Help My Datacenter is On Fire
|
||||||
- row:
|
- row:
|
||||||
columns:
|
columns:
|
||||||
- column:
|
- column:
|
||||||
|
@ -166,16 +155,16 @@ event_schedule:
|
||||||
time: 14:50
|
time: 14:50
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Jean-Paul Sablerolle
|
||||||
title:
|
title: Power to the Open Source
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Filip Chyla
|
||||||
title:
|
title: Cloud-Native Security with the OWASP Cloud-Native Application Security Top 10
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Toshaan Bharvani
|
||||||
title:
|
title: Why Open Technologies need to use Open Technologies
|
||||||
- row:
|
- row:
|
||||||
columns:
|
columns:
|
||||||
- column:
|
- column:
|
||||||
|
@ -191,17 +180,17 @@ event_schedule:
|
||||||
time: 16:00
|
time: 16:00
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Marcel van der Velde
|
||||||
title:
|
title: Heuristic Park (why we can fake it until we make it)
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Ondřej Caletka
|
||||||
title:
|
title: Run your own networking lab with Vagrant and Ansible
|
||||||
link:
|
link:
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Joost van Dijk
|
||||||
title:
|
title: From passwords to passkeys: What's new with FIDO
|
||||||
- row:
|
- row:
|
||||||
columns:
|
columns:
|
||||||
- column:
|
- column:
|
||||||
|
@ -218,20 +207,20 @@ event_schedule:
|
||||||
title:
|
title:
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Marcel Kornegoor
|
||||||
title:
|
title: Course as Code: the future of AT Computing's training courses
|
||||||
link:
|
link:
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker:
|
speaker: Joyce Mellens
|
||||||
title:
|
title:Caer: An IoT Firewall for consumers
|
||||||
- row:
|
- row:
|
||||||
columns:
|
columns:
|
||||||
- column:
|
- column:
|
||||||
time: 17:55
|
time: 17:55
|
||||||
- column:
|
- column:
|
||||||
textfield:
|
textfield:
|
||||||
text: Borrel, gesponsord door ...?
|
text: Borrel, gesponsord door AT-Computing\nKeysigning party (download manual)
|
||||||
center: true
|
center: true
|
||||||
size: 3
|
size: 3
|
||||||
---
|
---
|
Reference in a new issue