diff --git a/content/evenementen/nluug/najaarsconferentie-2019/_index.md b/content/evenementen/nluug/najaarsconferentie-2019/_index.md index 24d4e6b..6dfe48e 100644 --- a/content/evenementen/nluug/najaarsconferentie-2019/_index.md +++ b/content/evenementen/nluug/najaarsconferentie-2019/_index.md @@ -131,7 +131,7 @@ event_schedule: talk: speaker: Hagen Bauer title: Treating documentation as code - link: + link: talks/hagen-bauer-treating-documentation-as-code/ - row: columns: - column: @@ -178,6 +178,7 @@ event_schedule: talk: speaker: Debarshi Basak title: Next generation app security and mitigation for Lawfirms + link: talks/debarshi-basak-next-generation-app-security-and-mitigation-for-lawfirms/ - column: talk: speaker: Anco Scholte ter Horst @@ -227,12 +228,12 @@ event_schedule: talk: speaker: Eric Verheul title: Remote Document Encryption - link: + link: talks/eric-verheul-remote-document-encryption/ - column: talk: speaker: Martin Geusebroek title: Counter social engineering - link: + link: talks/martin-geusebroek-counter-social-engineering/ - row: columns: - column: @@ -241,7 +242,7 @@ event_schedule: talk: speaker: Edwin den Andel title: Tales (Fails) from the trenches… - link: + link: talks/edwin-van-andel-tales-fails-from-the-trenches/ center: true size: 3 - row: diff --git a/content/evenementen/nluug/najaarsconferentie-2019/talks/andreas-hulsing-post-quantum-cryptography.md b/content/evenementen/nluug/najaarsconferentie-2019/talks/andreas-hulsing-post-quantum-cryptography.md index e6e0275..80b7302 100644 --- a/content/evenementen/nluug/najaarsconferentie-2019/talks/andreas-hulsing-post-quantum-cryptography.md +++ b/content/evenementen/nluug/najaarsconferentie-2019/talks/andreas-hulsing-post-quantum-cryptography.md @@ -1,7 +1,7 @@ --- categories: - presentaties -date: 2023-07-03T10:31:43+02:00 +date: 2019-11-21T10:31:43+02:00 description: "" layout: event-talk tags: diff --git a/content/evenementen/nluug/najaarsconferentie-2019/talks/bram-cappers-eventpad-cybercrime-analysis-using-visual-analytics.md b/content/evenementen/nluug/najaarsconferentie-2019/talks/bram-cappers-eventpad-cybercrime-analysis-using-visual-analytics.md index 1c75e93..2759f9b 100644 --- a/content/evenementen/nluug/najaarsconferentie-2019/talks/bram-cappers-eventpad-cybercrime-analysis-using-visual-analytics.md +++ b/content/evenementen/nluug/najaarsconferentie-2019/talks/bram-cappers-eventpad-cybercrime-analysis-using-visual-analytics.md @@ -1,7 +1,7 @@ --- categories: - presentaties -date: 2023-07-03T10:31:43+02:00 +date: 2019-11-21T10:31:43+02:00 description: "" layout: event-talk tags: diff --git a/content/evenementen/nluug/najaarsconferentie-2019/talks/carlo-berto-an-update-on-rpki.md b/content/evenementen/nluug/najaarsconferentie-2019/talks/carlo-berto-an-update-on-rpki.md index 7c5c63c..bb80630 100644 --- a/content/evenementen/nluug/najaarsconferentie-2019/talks/carlo-berto-an-update-on-rpki.md +++ b/content/evenementen/nluug/najaarsconferentie-2019/talks/carlo-berto-an-update-on-rpki.md @@ -1,7 +1,7 @@ --- categories: - presentaties -date: 2023-07-03T10:31:43+02:00 +date: 2019-11-21T10:31:43+02:00 description: "" layout: event-talk tags: diff --git a/content/evenementen/nluug/najaarsconferentie-2019/talks/carlo-meijer-self-encrypting-deception.md b/content/evenementen/nluug/najaarsconferentie-2019/talks/carlo-meijer-self-encrypting-deception.md index 2617add..d8290af 100644 --- a/content/evenementen/nluug/najaarsconferentie-2019/talks/carlo-meijer-self-encrypting-deception.md +++ b/content/evenementen/nluug/najaarsconferentie-2019/talks/carlo-meijer-self-encrypting-deception.md @@ -1,7 +1,7 @@ --- categories: - presentaties -date: 2023-07-03T10:31:43+02:00 +date: 2019-11-21T10:31:43+02:00 description: "" layout: event-talk tags: diff --git a/content/evenementen/nluug/najaarsconferentie-2019/talks/david-blank-edelman-sre101-lessons-from-a-parallel-universe.md b/content/evenementen/nluug/najaarsconferentie-2019/talks/david-blank-edelman-sre101-lessons-from-a-parallel-universe.md index a6d712c..08ca75f 100644 --- a/content/evenementen/nluug/najaarsconferentie-2019/talks/david-blank-edelman-sre101-lessons-from-a-parallel-universe.md +++ b/content/evenementen/nluug/najaarsconferentie-2019/talks/david-blank-edelman-sre101-lessons-from-a-parallel-universe.md @@ -1,7 +1,7 @@ --- categories: - presentaties -date: 2023-07-03T10:31:43+02:00 +date: 2019-11-21T10:31:43+02:00 description: "" layout: event-talk tags: diff --git a/content/evenementen/nluug/najaarsconferentie-2019/talks/debarshi-basak-next-generation-app-security-and-mitigation-for-lawfirms.md b/content/evenementen/nluug/najaarsconferentie-2019/talks/debarshi-basak-next-generation-app-security-and-mitigation-for-lawfirms.md new file mode 100644 index 0000000..cd03830 --- /dev/null +++ b/content/evenementen/nluug/najaarsconferentie-2019/talks/debarshi-basak-next-generation-app-security-and-mitigation-for-lawfirms.md @@ -0,0 +1,28 @@ +--- +categories: +- presentaties +date: 2019-11-21T10:31:43+02:00 +description: "" +layout: event-talk +tags: +title: "Debarshi Basak - Next generation app security and mitigation for Lawfirms" +speakers: +- debarshi-basak +presentation: + filename: +recording: + platform: youtube + url: +--- + +## Abstract + +Majority of Lawfirms today rely on older technology due to hyperfocus on security and scepticism over container technologies. As the rest of the world transition to containers, we discuss challenges in the lawfirms. + +We propose an architecture to package applications, deliver, distribute and run third party vendor applications securely along with a method to capture and measure total cost of ownership. + +We also discuss violation prevention effort that could be taken and a mitigation architecture in a scenario when there is a violation. + +## Biography + +Debarshi has almost 10 years of experience in Data Engineering, Container technologies etc. He has previously worked in Bol.com, SensysGatso and now at ReynenCourt BV addressing key issues in Container Technology and Security in modern infrastructure for Law Firms. \ No newline at end of file diff --git a/content/evenementen/nluug/najaarsconferentie-2019/talks/edwin-van-andel-tales-fails-from-the-trenches.md b/content/evenementen/nluug/najaarsconferentie-2019/talks/edwin-van-andel-tales-fails-from-the-trenches.md new file mode 100644 index 0000000..f61598f --- /dev/null +++ b/content/evenementen/nluug/najaarsconferentie-2019/talks/edwin-van-andel-tales-fails-from-the-trenches.md @@ -0,0 +1,32 @@ +--- +categories: +- presentaties +date: 2019-11-21T10:31:43+02:00 +description: "" +layout: event-talk +tags: +title: "Edwin van Andel - Tales (Fails) from the trenches…" +speakers: +- edwin-van-andel +presentation: + filename: +recording: + platform: youtube + url: https://www.youtube.com/watch?v=N3_ezZDzADI +--- + +## Abstract + +Edwin van Andel will take you on a ride through the beautiful, but sometimes scary, woods of bugs, fails and wonders, located in the misty valley of infosec. + +There will be tales of misdirected focus. There will be burning arrows flying towards the anonymous clientele of Zerocopter’s bug-bounty and coordinated vulnerability disclosure platform. And we will gaze at the sunset over the immortal fields of stupidity. + +Edwin will discuss and gives examples of beautifully chained exploits, utterly stupid designs, fails and the always funny owner’s responses. Fun, laughter and tears as we cool off and swim together in IoT infested waters. While always reflecting back to the key of all his presentations: Hackers can help. + +Will you hop on for a 45 minute ride through these hidden woods? Visual stupidity included as always! + +## Biography + +Edwin van Andel started hacking at the age of 13. Although he is now CEO of hacker company Zerocopter, his relationship with the hacker community is still the main driving force in his life. His dream to bring the brilliant minds of all hackers he knows together in one room and to hack everything that is brought in is something that he is getting closer to. + +In addition, together with the “Guild of Grumpy Old Hackers”, he is actively guiding and leading young hackers in the right direction in order to create his ultimate goal - a safe society through a safer internet. \ No newline at end of file diff --git a/content/evenementen/nluug/najaarsconferentie-2019/talks/eric-verheul-remote-document-encryption.md b/content/evenementen/nluug/najaarsconferentie-2019/talks/eric-verheul-remote-document-encryption.md new file mode 100644 index 0000000..1588d0e --- /dev/null +++ b/content/evenementen/nluug/najaarsconferentie-2019/talks/eric-verheul-remote-document-encryption.md @@ -0,0 +1,30 @@ +--- +categories: +- presentaties +date: 2019-11-21T10:31:43+02:00 +description: "" +layout: event-talk +tags: +title: "Eric Verheul - Remote Document Encryption" +speakers: +- eric-verheul +presentation: + filename: 2019-11-21-eric-verheul-remote-document-encryption.pdf +recording: + platform: youtube + url: https://www.youtube.com/watch?v=hnL7ET6Y9RM +--- + +## Abstract + +We introduce Remote Document Encryption (RDE) allowing any party to encrypt data for a holder of an electronic passport such that only with physical possession of the passport decryption is possible. RDE is not an intended functionality of passports and actually consists of a tweak of passport protocols. Electronic passports allow for 160 bit security exceeding current good practice of 128 bit security. + +In the presentation we also indicate possible applications including secure email and end- to-end secure file sending. In the second quarter of 2018 a proof-of-concept was done with RDE based secure mail. This pilot was successful and indicated that RDE was indeed a viable technique. SURF, the collaborative ICT organisation for Dutch education and research, intends to implement RDE in its Filesender instance and is planning a pilot in 2019. + +## Biography + +Eric Verheul is an independent cryptographic consultant and part-time professor at the Radboud University Nijmegen. Eric teaches a Master Course in security management and does research in applied cryptography and privacy enhancing technologies. + +His scientific goal is to creatively (ab)use existing cryptographic techniques and protocols achieving optimal (privacy) protection at low cost. His presentation at NLUUG on Remote Document Encryption is a good example of this. + +Eric also serves as cryptographic architect in the Dutch eID scheme in which capacity he has developed the technique of polymorphic encryption and pseudonymization (PEP). This supplements federative authentication with strong privacy protection. Paradoxically, PEP allows the identity provider DigiD conducting authentications in an anonymous way while still being able delivering identifying information (or pseudonym) to service providers. From June 4 2018 issued Dutch driver licenses support PEP. \ No newline at end of file diff --git a/content/evenementen/nluug/najaarsconferentie-2019/talks/hagen-bauer-treating-documentation-as-code.md b/content/evenementen/nluug/najaarsconferentie-2019/talks/hagen-bauer-treating-documentation-as-code.md new file mode 100644 index 0000000..b815857 --- /dev/null +++ b/content/evenementen/nluug/najaarsconferentie-2019/talks/hagen-bauer-treating-documentation-as-code.md @@ -0,0 +1,30 @@ +--- +categories: +- presentaties +date: 2019-11-21T10:31:43+02:00 +description: "" +layout: event-talk +tags: +title: "Hagen Bauer - Treating documentation as code" +speakers: +- hagen-bauer +presentation: + filename: 2019-11-21-hagen-bauer-treating-documentation-as-code.pdf +recording: + platform: youtube + url: +--- + +## Abstract + +Use the editor you love and manage your documentation in a version control system. Have you been there too? You are forced to use a word processor to write technical documentation. You get frustrated from all this cut and paste and keeping up with different versions of input? And at the end you have to waste your time to convert the result into different versions for different audiences and different outputs? + +Imagine this: you can use the text editor from the device you like the most (e.g. vi on your smartphone). Artifacts from configurations files are always up to date. Images and tables are generated from external tools without any manual steps. Different versions are created on demand with content that the intended audience is allowed or able to consume. And if you are working in a team you can have continuous documentation that creates the output of your choice for web, printing or ebooks from one single source of truth. + +Let's have a look how you can use asciidoctor to create documentation in a way you will love. + +## Biography + +Hagen Bauer can look back on more then 15 year of experience in the areas of open source content management, system administration and ecommerce. His personal mission is to help organisation of any size to deploy recent innovations in open source to reduce complexity and secure IT. + +Hagen holds a masters (Diplom-Informatiker) in computer science, is an Open Group Distinguished IT Specialist and certified pfSense administrator. He is a frequent speaker at open source and enterprise software conferences for the last 20 years. \ No newline at end of file diff --git a/content/evenementen/nluug/najaarsconferentie-2019/talks/martin-geusebroek-counter-social-engineering.md b/content/evenementen/nluug/najaarsconferentie-2019/talks/martin-geusebroek-counter-social-engineering.md new file mode 100644 index 0000000..658f204 --- /dev/null +++ b/content/evenementen/nluug/najaarsconferentie-2019/talks/martin-geusebroek-counter-social-engineering.md @@ -0,0 +1,31 @@ +--- +categories: +- presentaties +date: 2019-11-21T10:31:43+02:00 +description: "" +layout: event-talk +tags: +title: "Martin Geusebroek - Counter social engineering" +speakers: +- hagen-bauer +presentation: + filename: 2019-11-21-martin-geusebroek-counter-social-engineering.pdf +recording: + platform: youtube + url: +--- + +## Abstract + +This talk takes you on a journey through the shadow networks where access to information is vital. A world in which the line between spectator, participant, manipulator or victim of manipulation is unclear. Confidentiality, availability and integrity of information is vital for your business and society. + +What if your data becomes the target of social engineers in order to access your business crown jewels, influence you, or even society into criminal act without even realizing it? + + +How do they proceed? What is profiling and pretexting? And how does behavioral manipulation and eliciting confidential information work. Eventually you will gain inspiration while sharing our knowledge on how we can counter social engineering together. + +## Biography + +Martin is one of our most experienced subject matter experts! He obtained knowledge and experience in Social Engineering in an international environment while working for the Dutch government. + +Martin not only teaches in an inspiring way, but also provides many striking practical examples. It is his wish to educate staff in order to make organizations better protected against attacks by social engineers. \ No newline at end of file diff --git a/content/evenementen/nluug/najaarsconferentie-2019/talks/michael-boelen-lets-create-better-scripts.md b/content/evenementen/nluug/najaarsconferentie-2019/talks/michael-boelen-lets-create-better-scripts.md index ea54bc1..c6d6082 100644 --- a/content/evenementen/nluug/najaarsconferentie-2019/talks/michael-boelen-lets-create-better-scripts.md +++ b/content/evenementen/nluug/najaarsconferentie-2019/talks/michael-boelen-lets-create-better-scripts.md @@ -1,7 +1,7 @@ --- categories: - presentaties -date: 2023-07-03T10:31:43+02:00 +date: 2019-11-21T10:31:43+02:00 description: "Een presentatie gegeven door Michael Boelen over het optimaliseren van shellscripts en tips om ze veiliger en betrouwbaarder te maken." layout: event-talk tags: