Note: Captions will be provided by February 11, 2020.
Co-hosted by Tetrate
This one-and-a-half day conference will focus on identity management and access control in multi-clouds to mitigate insider threats and return control back to owners of applications and data. Emphasis will be placed on emerging concepts such as zero-trust architecture where gaining entry through a firewall or having an IP address does not provide additional privileges. The workshop will address attacks by implementing mutual TLS, secure service discovery, traffic encryption between services, and access control at the client, service, and data level through what is referred to as a “service mesh architecture.” Service mesh architectures originated to benefit the operational infrastructure of sophisticated cloud providers but are now becoming mainstream through the availability of tool sets and open-source SDKs that streamline and eliminate much of the complexity of their deployment.
The conference program will feature experts on service mesh architectures, identity, and access control in the modern-day cloud architecture and address the following themes:
- Mitigating insider threat
- Service mesh use cases, tools, analysis, and deployment experience
- Enforcing next-generation attribute-based access controls in the multi-cloud
Tutorials, demonstrations, and vendor displays will offer attendees the opportunity to gain insights into these emerging technologies and connect with tool and integration experts.
Entrepreneurs, students, and cybersecurity professionals in particular, are encouraged to attend!
Speaker Bios and Pictures
Full List of Speaker Bios and Pics (PDF)
Register For the January 22nd Session
Join a day early for hands-on sessions and lighting talks!
January 22, 2019 8:30 am – 12.30 pm | The Basics of Istio & Envoy | Tetrate
Click on the "Register" usa-button to opt in for the January 22nd Session
During this workshop you will gain hands-on experience to understand how Envoy & Istio have changed the landscape of cloud native applications. This 4-hour training will demonstrate how and why to use these tools to solve the challenges of security, observability, networking, and multi-cloud. Topics include:
- Traffic Management and Resilient Communication between Services
- Policy Enforcement and Rate Limiting
- Telemetry, Monitoring and Reporting
- Securing Communication between Microservices
- Canary Deployment