forked from devopsdays/devopsdays-web
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[ZRH-2018] Publish program (devopsdays#4110)
* [ZRH-2018] Update speaker info for Baruch Sadogursky * [ZRH-2018] Update speaker info for Nicole Becher * [ZRH-2018] Update speaker info for Philipp Krenn * [ZRH-2018] Update speaker info for Torben Hoeft * [ZRH-2018] Program * [ZRH-2018] Add workshop with Tanya and Nicole
- Loading branch information
1 parent
42ed9aa
commit f1210c9
Showing
14 changed files
with
261 additions
and
30 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,8 +1,8 @@ | ||
+++ | ||
City = "Zürich" | ||
Year = "2018" | ||
date = "2017-03-15T20:37:34+01:00" | ||
title = "Zürich 208 Program" | ||
date = "2018-03-07T20:37:34+01:00" | ||
title = "Zürich 20s8 Program" | ||
type = "program" | ||
aliases = ["/events/2017-zurich/talks/"] | ||
aliases = ["/events/2018-zurich/talks/"] | ||
+++ |
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file was deleted.
Oops, something went wrong.
25 changes: 25 additions & 0 deletions
25
content/events/2018-zurich/program/workshop-with-tanya-janca-and-nicole-becher.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
+++ | ||
City = "Zurich" | ||
Year = "2018" | ||
talk_date = "" | ||
talk_start_time = "" | ||
talk_end_time = "" | ||
title = "How to Hack Your Own Apps" | ||
type = "talk" | ||
speakers = ["tanya-janca", "nicole-becher"] | ||
youtube = "" | ||
vimeo = "" | ||
speakerdeck = "" | ||
slideshare = "" | ||
slides = "" | ||
+++ | ||
|
||
DevOps is like a revolution of your IT in many ways. To encourage that it, Swisscom set up | ||
a dedicated Tribe to support the revolution. As part of the "Enabling Services" Tribe, the | ||
"DevOps Services" Squad provides services around CI/CD and the software development | ||
lifecycle. In this talk, we like to demonstrate the benefit of such a dedicated team and | ||
how it boosts your transformation. Giving your teams the right tools, even if you work in | ||
a strongly regulated environment is crucial. The "DevOps Services" Squad used leading | ||
technologies such as Docker, Kubernetes, Terraform, Ansible, Prometheus and much more to | ||
provide a SaaS stack within Swisscom. Apart from why and how they build it, you will get | ||
the chance to see it in action. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,24 +1,24 @@ | ||
+++ | ||
Title = "Nicole Becher" | ||
Twitter = "thedeadrobots" | ||
image = "nicole-becher.png" | ||
image = "nicole-becher.jpg" | ||
type = "speaker" | ||
linktitle = "nicole-becher" | ||
|
||
+++ | ||
|
||
Nicole Becher is professional information security consultant. | ||
Nicole Becher is professional information security consultant. | ||
|
||
She has been in the cybersecurity space for over ten years working mainly in offensive security capacities. | ||
|
||
She manages penetration testing and red teams, forensics and incident responders, and malware reverse engineering teams. She has also worked on the cyber policy side for New York State Department of Financial Services, where she helped develop the first-in-nation regulatory framework for assessing the cybersecurity of large and complex financial institutions. | ||
She manages penetration testing and red teams, forensics and incident responders, and malware reverse engineering teams. She has also worked on the cyber policy side for New York State Department of Financial Services, where she helped develop the first-in-nation regulatory framework for assessing the cybersecurity of large and complex financial institutions. | ||
|
||
She also helped draft the first-in-nation regulatory and licensing framework for Bitcoin and virtual currencies. Nicole is also as an Adjunct Instructor at New York University, where she teaches courses on offensive and defensive computer security, network security, web application security, and computer forensics. | ||
She also helped draft the first-in-nation regulatory and licensing framework for Bitcoin and virtual currencies. Nicole is also as an Adjunct Instructor at New York University, where she teaches courses on offensive and defensive computer security, network security, web application security, and computer forensics. | ||
|
||
She is a chapter leader for OWASP Brooklyn (Open Web Application Security Project) and has presented both talks and trainings, at various conferences around the world on topics related to her research interests. These include web application security, malware analysis, economics of cybersecurity, cybercrime, and international cyberlaws and regulation. She has also advised Hollywood scriptwriters on cybersecurity and hacking (maybe mention that script writing is one of your interests as well?). | ||
She is a chapter leader for OWASP Brooklyn (Open Web Application Security Project) and has presented both talks and trainings, at various conferences around the world on topics related to her research interests. These include web application security, malware analysis, economics of cybersecurity, cybercrime, and international cyberlaws and regulation. She has also advised Hollywood scriptwriters on cybersecurity and hacking (maybe mention that script writing is one of your interests as well?). | ||
|
||
She is a Cybersecurity fellow of New America, a Washington DC-based think-tank, and is a fellow of the Madison Policy Forum, a cybersecurity-focused policy group bridging military, government and industry. | ||
She is a Cybersecurity fellow of New America, a Washington DC-based think-tank, and is a fellow of the Madison Policy Forum, a cybersecurity-focused policy group bridging military, government and industry. | ||
|
||
She is a Certified Information Systems Security Professional (CISSP). | ||
She is a Certified Information Systems Security Professional (CISSP). | ||
|
||
Nicole is part of the Conservation SMART Technology Security Council is very active in the Animal Rescue and conservation technology movements. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,12 +1,12 @@ | ||
+++ | ||
Title = "Philipp Krenn" | ||
Twitter = "xeraa" | ||
image = "philipp-krenn.png" | ||
image = "philipp-krenn.jpg" | ||
type = "speaker" | ||
linktitle = "philipp-krenn" | ||
|
||
+++ | ||
|
||
Philipp is part of the infrastructure team and a developer advocate at Elastic. | ||
Philipp is part of the infrastructure team and a developer advocate at Elastic. | ||
|
||
He is frequently talking about full-text search, databases, operations, and security. Additionally, he is organizing multiple meetups in Vienna. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Binary file not shown.
Binary file not shown.
Binary file not shown.