With the rising demand for software and automated solutions comes a high risk with it. Cyber Security is more important than ever before and therefore we have invited a bunch of professionals on this topic so they can share their knowledge with you. From ransomware and how to fight it to cloud security and IoT, you will gain insights into the most recent practices to make your project even better and much safer! Get ready to tune in for our WeAreDevelopers LIVE - Security Day!
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
Save Your SpotTogether with BOSCH we invite you to a full day of learning more about the intersection of mobility and code. Get to know more about how modern mobility is defined by an intricate interplay of hardware and software and how cars are not only connected to the road, but also to the cloud.
Coding the Future of Mobility features a variety of talks and a workshop, that give you valuable insights into the world of mobility - wether you join in-person or online.
Together with Bosch we invite you to a full day of learning more about the intersection of mobility and code. Get to know more about how modern mobility is defined by an intricate interplay of hardware and software and how cars are not only connected to the road, but also to the cloud.
Coding the Future of Mobility features a variety of talks and a workshop, that give you valuable insights into the world of mobility - wether you join in-person or online.
Every application at some point needs to tackle user permissions. It may be early for some systems or much later in others, but one thing for certain is that as soon as you have more than one user type, the logic will slowly evolve into spaghetti code. And then each time you need to update it will take longer and longer to complete.
In this talk, we’ll proselytize about why decoupling authorization logic is the absolute best solution to the spaghetti code problem and other common authorization pitfalls. We'll look at real-world(ish) permissions implementations using open-source solutions. We'll try things like adding new role-based access controls to an application and evolving it to fine-grained attribute-based access controls. Along the way, we will run into typical blockers and try out ways to solve them. We'll also look at best practices for authorization (role management, policy evolution, the filtering problem, etc.) and when to just use the most obvious solution.
Alex Olivier is the CPO and Co-founder at Cerbos. He has designed enterprise solutions from the ground up as an engineer, consultant, tech lead and product manager, always with an eye on the developer experience. At Microsoft, Qubit, and a myriad of startups he designed platforms which helped teams move faster at scale, with a focus on core components like authorization, data management and security.
Alex has spoken on data and infrastructure topics at CollisionConf, Google Cloud NEXT, CogX, AI Congress amongst many others.
Join us for a presentation where we share the mysteries of anti-bot systems, protected websites, APIs, and mobile applications!
🌐📲🛠️ What's in Store:
1/ Exploring the Defence LayersUncover the intricate layers of defence with TCP Fingerprint, TLS Fingerprint, HTTP/2 Fingerprint, and Browser Fingerprint. 🤯🔍
2/ Anti-Bot Reputation Score DemystifiedDelve into the workings of the anti-bot reputation score, understanding how it operates across various layers to fortify websites. 🛡️💡
3/ Strategies for EvasionDiscover crafty strategies to navigate through these defences, unveiling techniques to outsmart detection mechanisms. 🕵️♂️💨💼 Equip Yourself
After this talk, you'll emerge well-equipped with knowledge to navigate and comprehend the nuances of these protective measures! 🚀🔒Don't miss this opportunity to gain insights into the fascinating world of anti-bot systems. 🌐🔓
Fabien Vauchelles is the Anti-Ban Expert at Wiremind. With over a decade of experience in web scraping, Fabien's passion for code and technology helps him to bypass bans. He is the creator of Scrapoxy, an opensource proxy aggregator for webscraping. He had the opportunity to speak at Devoxx FR, Zyte’s Extract Summit and Voxxed Days.
Types in programming languages protect us from doing mistakes. It depends on the chosen language how strict and often these type checks are performed. One code smell you may have heard of is called “Primitive Obsession.” It occurs when you are relying too much on built-in data types like integers and strings. Type systems gained a lot of power over the last decades. Many programming languages allow us to embed business rules and security properties directly into types. This enables the compiler to statically enforce these rules. Preventing mistakes and vulnerabilities by design is our goal.
In this talk I will show you a couple of examples how to encode business work flows and constraints into types. The examples will be in a variety of programming language, demonstrating the wide applicability of this approach.
Michael Koppmann is a senior information security consultant at SBA Research. Michael’s consulting activities are focused on the technical aspects of information security. He frequently conducts penetration tests on a wide range of computer systems, including web, mobile, and cloud application security, source code audits, architecture reviews and more.
Michael is also one of the organizers of sec4dev, SBA Research’s security conference for developers. His research interests include green sustainable software, secure and maintainable software engineering, and online privacy.
There are so many bits that fight to occupy our time and attention. How do we know what is critical to prioritize and how it impacts other things? This is true of our every day personal and professional lives, but is especially true in the cyber world.
In this session, we will see how graph databases focus on the entities and the connections between them to make contextualizing data incredibly simple. We will walk through how to dump cyber data into a graph and use the power of relationships and accompanying tools to uncover hidden connections and patterns. Gathering tips and tricks will help us optimize the model for querying and access the data through queries, visualization, and applications.
Join us to harness the power of graph databases to find and act upon critical data for security threats.
Jennifer Reif is a Developer Relations Engineer at Neo4j, speaker, and blogger with an MS in CMIS. An avid developer and problem-solver, she has worked with many businesses and projects to organize and make sense of widespread data assets and leverage them for maximum business value. She has expertise in a variety of commercial and open source tools, and she enjoys learning new technologies, sometimes on a daily basis! Her passion is finding ways to organize chaos and deliver software more effectively.