Meerdere talks NJ2019 toegevoegd
This commit is contained in:
parent
8f8f5a6672
commit
4183483b76
|
@ -77,7 +77,7 @@ event_schedule:
|
||||||
speaker: David Blank-Edelman
|
speaker: David Blank-Edelman
|
||||||
title: "SRE101: Lessons from a Parallel Universe"
|
title: "SRE101: Lessons from a Parallel Universe"
|
||||||
keynote: true
|
keynote: true
|
||||||
link:
|
link: talks/david-blank-edelman-sre101-lessons-from-a-parallel-universe/
|
||||||
center: true
|
center: true
|
||||||
size: 3
|
size: 3
|
||||||
- row:
|
- row:
|
||||||
|
@ -97,7 +97,7 @@ event_schedule:
|
||||||
talk:
|
talk:
|
||||||
speaker: Andreas Hülsing
|
speaker: Andreas Hülsing
|
||||||
title: Post-quantum cryptography
|
title: Post-quantum cryptography
|
||||||
link:
|
link: talks/andreas-hulsing-post-quantum-cryptography/
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker: Moritz Müller
|
speaker: Moritz Müller
|
||||||
|
@ -154,7 +154,7 @@ event_schedule:
|
||||||
talk:
|
talk:
|
||||||
speaker: Bram Cappers
|
speaker: Bram Cappers
|
||||||
title: "Eventpad: Cybercrime Analysis Using Visual Analytics"
|
title: "Eventpad: Cybercrime Analysis Using Visual Analytics"
|
||||||
link:
|
link: talks/bram-cappers-eventpad-cybercrime-analysis-using-visual-analytics/
|
||||||
- column:
|
- column:
|
||||||
talk:
|
talk:
|
||||||
speaker: Koen de Jonge
|
speaker: Koen de Jonge
|
||||||
|
|
|
@ -0,0 +1,34 @@
|
||||||
|
---
|
||||||
|
categories:
|
||||||
|
- presentaties
|
||||||
|
date: 2023-07-03T10:31:43+02:00
|
||||||
|
description: ""
|
||||||
|
layout: event-talk
|
||||||
|
tags:
|
||||||
|
- shell
|
||||||
|
- scripting
|
||||||
|
title: "Andreas Hülsing - Post-quantum cryptography"
|
||||||
|
speakers:
|
||||||
|
- andreas-hulsing
|
||||||
|
presentation:
|
||||||
|
filename: 2019-11-21-andreas-hulsing-post-quantum-cryptography.pdf
|
||||||
|
recording:
|
||||||
|
platform: youtube
|
||||||
|
url: https://www.youtube.com/watch?v=hebljeD0Ngw
|
||||||
|
---
|
||||||
|
|
||||||
|
## Abstract
|
||||||
|
|
||||||
|
As soon as large scale quantum computers are built today's cryptography does not provide security anymore. This threatens the security of our digital society. Even worse: For some data that we send or store in encrypted form we want secrecy to hold for our whole lifetime, if not longer. Think of medical data for example. This data can be stored and decrypted when a quantum computer is available.
|
||||||
|
|
||||||
|
Post-quantum cryptography is the study of conventional cryptography in the presence of an adversary with access to a quantum computer. In this talk I will give an overview of the landscape of schemes submitted to the recent NIST standardization project. I will discuss the underlying problems and summarize the current knowledge about quantum algorithms to solve them.
|
||||||
|
|
||||||
|
In addition, I will touch on challenges in the area of provable post-quantum security.
|
||||||
|
|
||||||
|
## Biography
|
||||||
|
|
||||||
|
I am assistant professor in the Coding Theory and Cryptology group at Eindhoven University of Technology (TU/e). My research focuses on post-quantum cryptography — cryptography that resists quantum computer-aided attacks. My works range from theoretical works, like how to model quantum attacks or formal security arguments in post-quantum security models, to applied works, like the analysis of side-channel attacks or the development of efficient hash-based signature schemes. In many of my works I try to combine the theoretical and the applied perspective. This is especially reflected in my work on standardizing post-quantum cryptography.
|
||||||
|
|
||||||
|
Before my current position, I was a postdoctoral researcher in the Coding Theory and Cryptology group, working with Tanja Lange in the PQCRYPTO project. Before I was a postdoctoral researcher in the cryptographic implementations group at TU/e, working with Daniel J. Bernstein. I did my PhD in the cryptography and computer algebra group at TU Darmstadt under the supervision of Johannes Buchmann.
|
||||||
|
|
||||||
|
Before starting my PhD, I worked as a research fellow at Fraunhofer SIT in Darmstadt. I hold a Diploma in computer science from TU Darmstadt.
|
|
@ -0,0 +1,30 @@
|
||||||
|
---
|
||||||
|
categories:
|
||||||
|
- presentaties
|
||||||
|
date: 2023-07-03T10:31:43+02:00
|
||||||
|
description: ""
|
||||||
|
layout: event-talk
|
||||||
|
tags:
|
||||||
|
- shell
|
||||||
|
- scripting
|
||||||
|
title: "Bram Cappers - Eventpad: Cybercrime Analysis Using Visual Analytics"
|
||||||
|
speakers:
|
||||||
|
- bram-cappers
|
||||||
|
presentation:
|
||||||
|
filename:
|
||||||
|
recording:
|
||||||
|
platform: youtube
|
||||||
|
url: https://www.youtube.com/watch?v=TJixUQhU-lY
|
||||||
|
---
|
||||||
|
|
||||||
|
## Abstract
|
||||||
|
|
||||||
|
Automation of malware analysis is a popular and very important topic, but with human cognition still outperforming AI we are still indispensable. In this talk we show how we can exploit the human eye for the analysis of large PCAP files and event logs using visual analytics.
|
||||||
|
|
||||||
|
At the TU/e we designed a system Eventpad to quickly visualize patterns and anomalies in event collections. In this talk we give live demos on how we can use the tool to discover fraud in VoIP traffic, discover chemical waste dumping in a wildlife preserve and reverse engineer Ransomware in back office environments.
|
||||||
|
|
||||||
|
## Biography
|
||||||
|
|
||||||
|
Bram Cappers is a postdoctoral researcher at Eindhoven University of Technology and cofounder of the startup AnalyzeData. In 2018 he finished his PhD in the area of data visualization and cyber security. where he developed new antivirus technology to visually detect patterns and anomalies in network traffic.
|
||||||
|
|
||||||
|
Bram has won numerous awards in the area of data science and presented his technology at prestigious events such as BlackHat USA 2018 and Still Hacking Anyway 2017.
|
|
@ -0,0 +1,30 @@
|
||||||
|
---
|
||||||
|
categories:
|
||||||
|
- presentaties
|
||||||
|
date: 2023-07-03T10:31:43+02:00
|
||||||
|
description: ""
|
||||||
|
layout: event-talk
|
||||||
|
tags:
|
||||||
|
- shell
|
||||||
|
- scripting
|
||||||
|
title: "David Blank-Edelman - SRE101: Lessons from a Parallel Universe"
|
||||||
|
speakers:
|
||||||
|
- david-blank-edelman
|
||||||
|
presentation:
|
||||||
|
filename:
|
||||||
|
recording:
|
||||||
|
platform: youtube
|
||||||
|
url: https://www.youtube.com/watch?v=oKnc8rcg1H0
|
||||||
|
---
|
||||||
|
|
||||||
|
## Abstract
|
||||||
|
|
||||||
|
Just within the last fifteen years, we have seen at least two separate communities evolve from the generic idea of Systems Administration/Operations. The first, DevOps, grew up very much in public. The second, SRE, germinated within the halls of “special” companies like Google and Facebook and is now starting to gain significant visibility and traction in the wider world.
|
||||||
|
|
||||||
|
Join me for an introduction to SRE: what it is, why it matters, how it relates to other operations practices like DevOps, and if/how you can get started with it in your organization.
|
||||||
|
|
||||||
|
## Biography
|
||||||
|
|
||||||
|
David has over thirty years of experience in the systems administration/DevOps/SRE field in large multiplatform environments. He is the curator/editor of the O'Reilly Book Seeking SRE: Conversations on Running Production Systems at Scale and author of the O'Reilly Otter Book (Automating Systems Administration with Perl).
|
||||||
|
|
||||||
|
David is a co-founder of the wildly popular SREcon conferences hosted globally by USENIX. David currently works for Microsoft as a senior cloud advocate focusing on site reliability engineering.
|
|
@ -23,7 +23,7 @@ Whether you call yourself a system administrator, developer, or DevOps sprint me
|
||||||
|
|
||||||
Focus areas of this presentation include error handling, security, style, and best practices. Also, it will cover (many) mistakes made by Michael over the last 20 years. Got some of your own? They are welcome as part of the discussion.
|
Focus areas of this presentation include error handling, security, style, and best practices. Also, it will cover (many) mistakes made by Michael over the last 20 years. Got some of your own? They are welcome as part of the discussion.
|
||||||
|
|
||||||
## Biografie
|
## Biography
|
||||||
|
|
||||||
Michael Boelen specializes in the field of Linux and UNIX security. He worked as a consultant for several Fortune 500 companies like Philips and ASML. In 2013, Michael started the security firm CISOfy to simplify security.
|
Michael Boelen specializes in the field of Linux and UNIX security. He worked as a consultant for several Fortune 500 companies like Philips and ASML. In 2013, Michael started the security firm CISOfy to simplify security.
|
||||||
|
|
||||||
|
|
Reference in a new issue