10:05 - 10:50 Track D

Log4Shell restrospective

It's been one and a half years: Let look behind the immediate pain of Java's now infamous logging library Log4j — what happened, how, and why it's still relevant.

  • How does the vulnerability work and why was it so special?
  • Why is it relatively complex to detect and evaluate for both custom and off-the-shelf software?
  • How can you monitor exploitation attempts?
  • Can we avoid the next one?
Read more...
Speaker:
Philipp Krenn
Podjetje
Elastic
10:05 - 10:50 Thursday, June 1

Log4Shell restrospective

It's been one and a half years: Let look behind the immediate pain of Java's now infamous logging library Log4j — what happened, how, and why it's still relevant.

  • How does the vulnerability work and why was it so special?
  • Why is it relatively complex to detect and evaluate for both custom and off-the-shelf software?
  • How can you monitor exploitation attempts?
  • Can we avoid the next one?
Read more...
Speaker:
Philipp Krenn
Podjetje
Elastic
16:05 - 16:50 Thursday, June 1

Security: An Inconvenient Truth

There are security minded people. They have a password manager, and unique, strong, passwords for each account. They dutifully lock my computer each time they leave it alone. But there are others. For these people 'Security' is an ugly word. They skirt policies any way they can, leaving post-it's with 'Welcome123' in their wake. Worse, these aren't only users of your software. They're sometimes colleagues! These are people that value convenience over security. In this talk, I get in the mindset of the convenience minded person and try to find solutions that bring security and convenience together.

Read more...
Speaker:
Tom Hoeken
Podjetje
GROUP9 Elite.Java.Development
16:05 - 16:50 Track E

Security: An Inconvenient Truth

There are security minded people. They have a password manager, and unique, strong, passwords for each account. They dutifully lock my computer each time they leave it alone. But there are others. For these people 'Security' is an ugly word. They skirt policies any way they can, leaving post-it's with 'Welcome123' in their wake. Worse, these aren't only users of your software. They're sometimes colleagues! These are people that value convenience over security. In this talk, I get in the mindset of the convenience minded person and try to find solutions that bring security and convenience together.

Read more...
Speaker:
Tom Hoeken
Podjetje
GROUP9 Elite.Java.Development
Subscribe to this RSS feed