
7:30am PST
9:00am PST
9:15am PST
9:30am PST
9:35am PST
9:50am PST
9:55am PST
10:10am PST
10:15am PST
10:30am PST
11:00am PST
11:50am PST
Yes, Application Security Leads to Better Business Value. Learn How from Experts. - Larry Carvalho, RobustCloud; Hillary Benson, Gitlab; Kirsten Newcomer, Red Hat; David Zendzian, VMware Room 608
On Establish a Production Zero Trust Architecture - Frederick Kautz, SPIFFE/SPIRE Room 612
What's a Zero-Trust Tunnel? Exploring Security and Simpler Operations with Istio Ambient Mesh - Jim Barton & Marino Wijay, Solo.io Room 609
An Introduction to Cloud Native Capture the Flag - Andrew Martin & Andres Vega, ControlPlane Room 615/616
More Than Just a Pretty Penny! Why You Need Cybersecurity in Your Culture - Callan Andreacchi & Michaela Flatau, Defense Unicorns Room 602/603
Package Transparency for WebAssembly Registries - Kyle Brown, SingleStore Room 606/607
So You Want to Run Your Own Sigstore: Recommendations for a Secure Setup - Hayden Blauzvern, Google Room 613/614
12:25pm PST
1:55pm PST
⚡ Lightning Talk: Software Dark Matter is the Enemy of Software Transparency - Santiago Torres-Arias, Purdue University Room 602/603
Cloud Native Security Landscape: Myths, Dragons, and Real Talk - Edd Wilder-James & Loris Degioanni, Sysdig; Kim Lewandowski, Chainguard; Isaac Hepworth, Google; Randall Degges, Snyk Room 608
Avoiding IAC Potholes with Policy + Cloud Controllers - Andrew Martin, ControlPlane Room 609
From the Cluster to the Cloud: Lateral Movements in Kubernetes - Yossi Weizman & Ram Pliskin, Microsoft Room 612
OmniBOR: Bringing the Receipts for Supply Chain Security - Frederick Kautz, SPIFFE/SPIRE Room 606/607
Securing Self-Hosted GitHub Actions with Kubernetes and Actions-Runner-Controller - Natalie Somersall, GitHub Room 613/614
2:00pm PST
2:05pm PST
2:10pm PST
2:15pm PST
2:45pm PST
Beyond Cluster-Admin: Getting Started with Kubernetes Users and Permissions - Tiffany Jernigan, VMware Room 608
Zero Trust Workload Identity in Kubernetes - Michael Peters, Red Hat Room 609
From Illuminating to Eliminating Crypto Jacking Techniques in Cloud Native - Mor Weinberger, Aqua Security Room 612
Demystifying Zero-Trust for Cloud Native Technologies - Kishore Nadendla, TIAA; Mariusz SABATH, IBM Research; Asad Faizi, Eskala.io; Aradhna Chetal, CNCF Security TAG; Philip Griffiths, NetFoundry Room 602/603
Unpacking Open Source Security in Public Repos & Registries - Ben Hirschberg, ARMO Room 613/614
🦝 Let’s Talk Software Supply Chains with TAG Security - Michael Lieberman, Kusari Room 606/607
3:20pm PST
3:50pm PST
4:40pm PST
5:15pm PST
7:30am PST
9:00am PST
9:05am PST
9:20am PST
9:25am PST
9:40am PST
9:55am PST
10:00am PST
10:15am PST
10:20am PST
10:30am PST
11:00am PST
Journey to Cloud-Native, K8s and Trying to Secure It. - Graham E. Chukwumaobi, Independent Room 608
Zero Trust in the Cloud with WebAssembly and WasmCloud - Kevin Hoffman, Cosmonic Room 609
Mapping Motives Tells a Story: Analysis of 2,000 Enterprise Cloud Detections - David Wolf & Joshua Smith, Devo Room 612
Learning from Supply Chain Failures and Best Practices in Other Industries - Demian Ginther, Superorbital, LLC Room 613/614
SBOMs, VEX, and Kubernetes - Kiran Kamity, Deepfactor; Jonathan Meadows , Citi; Dr. Allan Friedman, Cybersecurity and Infrastructure Security Agency; Andrew Martin, Control Plane; Rose Judge, VMware Room 606/607
Tutorial: How to Build a K8s Admission Controller from Scratch! - Stephen Giguere, Bridgecrew; Angela Gizzi, LaunchDarkly; Matt Johnson, Prisma Cloud by PANW Room 602/603
11:50am PST
12:25pm PST
1:55pm PST
2:45pm PST
3:20pm PST
3:50pm PST
4:40pm PST