Security
24 sessions
13:30 What LLMs Do, and Don't, Know About Securing Kubernetes Hall 8 | Room G · Rory McCune → 14:15 Real-World Supply-Chain Security Hall 8 | Room G · Alex Leong → 15:15 Privacy as Infrastructure: Declarative Data Protection for AI on Kubernetes Hall 8 | Room G · Joaquin Rodriguez, Krishnendu Dasgupta → 16:00 Policy Engines for Kubernetes: Picking One Without Losing Your Mind Hall 7 | Room A · Nabarun Pal → 16:00 When Multitenancy Goes Wrong: A Deep Dive Into Kcp’s First CVE Elicium 2 · Marvin Beckers → 10:00 Automate Once, Run Anywhere: The Docker Moment for Security Workflows Hall 7 | Room C · Nancy Chauhan, Aseem Shrey → 10:00 Automating and Scaling of Threat Modelling for Cloud Native Architecture Elicium 2 · Hanna Papirna, Emma Yuan Fang → 10:00 Hacking GPU Observability: eBPF & Ephemeral Containers in Action on Kubernetes Hall 8 | Room F · Brandon Kang → 10:45 Bob and Alice Revisited: Understanding Encryption in Kubernetes Hall 7 | Room C · Jackie Maertens, Mitch Connors → 10:45 Hack Me If You Can: Learning Kubernetes Security Through a Role-Play Battle Hall 8 | Room F · Aoi Takahashi, Keita Mochizuki → 10:45 Why Security of Kubernetes Comes Down to Linux Security Elicium 2 · Marina Moore → 13:15 Audit-Ready Kubernetes: How Chase UK Leveraged Policy as Code for Continuous Compliance Hall 7 | Room C · Jim Bugwadia, Nischay Goyal → 13:15 How To Break Multi-Tenancy Again and Again ...and What We Can Learn From It Hall 8 | Room F · Lorin Lehawany, Sven Nobis → 14:00 Invisible Guardrails: Enabling Developer Velocity With a Secure Platform Hall 8 | Room F · James Elías Sigurðarson, Vignir Hafsteinsson → 15:00 Detect, Decide, Defend: Building Cloud Native Security That Fights Back Hall 7 | Room C · Matthias Bertschy → 15:00 Kubernetes Security at Shopify Scale: Automating Security Across an Infrastructure Monorepo Hall 8 | Room F · Jie Wu, Pulkit Garg → 15:45 Exploring NRI for Automated CA Trust Injection Hall 7 | Room C · Tsuzuki Tsuchiya, Kento Kubo → 15:45 Kubernetes Third Party Audit Review Hall 8 | Room F · Iain Smart, Amir Montazery, Rey Lejano, Tabitha Sable, Pietro Tirenna → 16:30 Signed, Sealed, Delivered: Why Reverse Proxies Outperform VPNs Hall 8 | Room F · Peter ONeill, Boris Kurktchiev → 16:30 Why Isn't the Fix in My Container? Tracking CVE Propagation Across 10,000 Projects Hall 7 | Room C · Mor Weinberger, Lior Kaplan → 10:00 SPIFFE Meets OAuth: Federated Identity for Cloud Native Workloads Hall 8 | Room F · Yoshiyuki Tabata → 10:45 Tailor Made: Dynamic Fine-Grained Authorization for API Traffic Hall 8 | Room F · Erica Hughberg, Andres Aguiar → 12:45 The Shared Service Blueprint: A Guide to Multi-Tenancy, Illustrated With KEDA Hall 8 | Room F · Aya Igarashi → 13:30 SB💣💣M: Making SBOMs Play Together Hall 8 | Room F · Jacopo Bufalino, Agathe Blaise →