Skip to content
  • Sign In
  • Try Now
View all events
Security

Security Superstream: Security in the Cloud

Published by O'Reilly Media, Inc.

Intermediate content levelIntermediate

Sophisticated (and increasingly frequent) security threats. Complex cloud ecosystems with multiple entry points. And a dearth of cybersecurity talent. Business leaders face a critical need without the means to take care of it. That’s why we’re presenting this live online event—gathering business leaders and industry experts to discuss the developments, trends, and tools you need to know about to create a solid security strategy.

The average cost of a cybersecurity breach in the US today is $9.44 million, so the urgency is real. This is an excellent opportunity to get an insider’s view of the best ways to protect your organization.

About the Security Superstream Series: This three-part series of events will cover some of the most challenging topics facing those who are concerned with security—ransomware and zero trust—with sessions that will get you up to speed on key techniques and best practices for ransomware prevention and mitigation, perimeter security, and more.

What you’ll learn and how you can apply it

  • Reduce security breaches during your cloud migration with an AppSec program
  • Apply cloud native principles to help your organization move to a zero trust model
  • Use cloud mitigation strategies to avoid the specific risks blockchain and cryptocurrencies face from large-scale quantum computers

This live event is for you because...

  • You’re a CISO, CTO, or member of senior management.
  • You brief business executives and leaders on recent security developments.
  • You want to gain a better understanding of how to secure your cloud capabilities and enable digital transformation.

Prerequisites

Schedule

The time frames are only estimates and may vary according to how the class is progressing.

Chloé Messdaghi: Introduction (5 minutes) - 7:00am PT | 10:00am ET | 2:00pm UTC/GMT

  • Chloé Messdaghi welcomes you to the Security Superstream.

Vandana Verma: Application Security in Cloud Migration (40 minutes) - 7:05am PT | 10:05am ET | 2:05pm UTC/GMT

  • Security breaches can happen, particularly when companies are moving to the cloud. But their likelihood can be reduced during migration with an AppSec program to detect and fix vulnerabilities. Join Snyk's Vandana Verma to explore the what, why, and how of cloud native application security and examine case studies and breaches to understand their implications for your own organization.
  • Vandana Verma is a security leader at Snyk as well as a podcast host, diversity and inclusion advocate, and international speaker and influencer on a range of themes in information security, including application security, DevSecOps, cloud security, and security careers. From chairing the OWASP Global Board of Directors to running groups promoting security to organizing conferences and delivering keynote addresses, she’s continuously and proactively engaged in making the global application security community a better place for individuals, organizations, and societies.
  • Break (5 minutes)

Nicolas Chaillan: How the Department of Defense Moved to Zero Trust—Leveraging DevSecOps and Kubernetes (40 minutes) - 7:50am PT | 10:10am ET | 2:50pm UTC/GMT

  • The largest organization on the planet was the first to implement DevSecOps and Kubernetes across jets, bombers, space and even nuclear systems. Learn how the US Department of Defense saved 100 years of time thanks to modern cloud native principles. Join Nicolas Chaillan to find out how it was done and discover the cultural challenges the DOD faced in the process.
  • Nicolas Chaillan is the former US Air Force chief software officer, where he was responsible for enabling Air Force programs in the transition to Agile and DevSecOps to establish force-wide DevSecOps capabilities and best practices, including continuous authorization to operate (c-ATO) processes and faster streamlined technology adoption. He was also the colead, with the Department of Defense’s chief information officer, of the DOD Enterprise DevSecOps Initiative (DSOP). In addition to his public service, Nicolas is a technology entrepreneur, software developer, cyber expert, and inventor. He has over 19 years of domestic and international experience with strong technical and subject matter expertise in cybersecurity, software development, product innovation, governance, risk management, and compliance.
  • Break (5 minutes)

Anastasia Marchenkova: Understanding Quantum Computing Encryption—Blockchain and Cryptocurrency Risks (40 minutes) - 8:35am PT | 11:35am ET | 3:35pm UTC/GMT

  • Could a quantum computer destroy bitcoin? And if it could, when should we start worrying about it? Join Anastasia Marchenkova to explore Shor’s algorithm, the one weird trick to breaking RSA and ECC encryption, the specific risks blockchain and cryptocurrencies face from large-scale quantum computers, and the potential mitigation strategies you'll need in a postquantum world.
  • Anastasia Marchenkova is a quantum researcher at Bleximo Corp., where she’s involved in building application specific quantum chips. She's also a YouTuber who talks about quantum computing and deep tech with the aim of getting more people excited about cutting-edge technology. Previously, Anastasia was a researcher at the quantum telecommunications and optics lab at Georgia Tech and at the Joint Quantum Institute at the University of Maryland.

Chloé Messdaghi: Closing Remarks (5 minutes) - 9:15am PT | 12:15pm ET | 4:15pm UTC/GMT

  • Chloé Messdaghi closes out today’s event.

Your Host

  • Chloé Messdaghi

    Chloé Messdaghi serves as the Head of Threat Intelligence at HiddenLayer, where she spearheads efforts to fortify security for AI measures and fosters collaborative initiatives to enhance industry-wide security practices for AI. A highly sought-after public speaker and trusted authority for national and sector-specific journalists, Chloé's expertise has been prominently featured across various media platforms. Her impactful contributions to cybersecurity have earned her recognition as a Power Player by esteemed publications such as Business Insider and SC Media.