Conference Talks

2018

Using a Kubernetes Operator to Manage Tenancy in a B2B SaaS App

Companies that create products for other companies or teams often have to reason about how to deal with the application-level tenancy of each team. This presentation will discuss how Kolide has approached the problem of application tenancy by building a Kubernetes Operator to manage the complete lifecycle of each tenant as an isolated instance of a single-tenant application.

Behind The Scenes: Kubernetes Release Notes Tips and Tricks

This session aims to shed more light on the release note process from the Kubernetes contributor’s point of view. We will briefly …

Instrumenting Dynamic Environments with Source Control, Peer Review, and Decentralized Intelligence Distribution

Osquery configurations often start simple and static, but, as the complexity of an osquery deployment grows, the level of dynamicism …

Starting Growing and Scaling Your Host Intrusion Detection Efforts

Osquery is a lightweight host intrusion detection tool that organizations can use to monitor extremely large production environments as …

2016

Building Successful Open Source Security Software

Released in 2014 by Facebook, osquery is an open source operating system instrumentation framework and toolset. In this talk, I will …

2015

OS X Operating System Security at Scale

A critical aspect of maintaining a robust infrastructure security posture is being able to ask low-level question of hosts in your …

2014

Host Intrusion Detection With Osquery

Osquery is a lightweight host intrusion detection tool that organizations can use to monitor extremely large production environments …

2013

Data Driven Web Application Security

The security posture of an application is directly proportional to the amount of information that is known about the application. How …

iOS and Android Security Mechanisms and Exploit Mitigations

The amount of conflicting information regarding mobile security today makes it almost impossible to distinguish topics that matter from …

2012

Mobile Exploit Intelligence Project

As organizations look to deploy larger numbers of mobile devices over this year, there is widespread disagreement in the security …

2011

Beat to 1337: Creating a Successful University Cyber Defense Organization

A university with no prior CTF experience and no students with significant prior information security experience may find competition a …