DevOps Conference
The Conference for Continuous Delivery, Microservices,
Containers, Clouds and Lean Business

What Star Wars Taught Me About Secure System Design

Session

Until March 18:
✓ Team discounts
✓ Save up to £240

Register Now

Until March 18:
✓ Team discounts
✓ Save up to £240

Register Now

Until March 4:
✓ Transformation Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save up to €870
Register now
Bis 4. März:
✓ Transformation Day for free
✓ Raspberry Pi oder C64 Mini for free
✓ Bis zu 870€ sparen
Jetzt anmelden
Until June 18:
✓ Workshop Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save over $840
Register now
Until June 18:
✓ Workshop Day for free
✓ Raspberry Pi or C64 Mini for free
✓ Save over $840
Register now
Until July 2:
✓ Raspberry Pi or C64 Mini for free
✓ Save up to $330
Register now
Until July 2:
✓ Raspberry Pi or C64 Mini for free
✓ Save up to $330
Register now
Thank you for joining!


Register now
Vielen Dank für Ihre Teilnahme!


Jetzt anmelden

Are movies purely entertainment? Or can you learn from movies in a fun way? I loved the Star Wars saga as a kid, and my work experience in network and application security has made me enjoy the movies even more.

R2D2 mining information, Han Solo getting past a protective shield with old authentication codes, or the Rebellion abusing a single point of failure – besides the space adventure, I see stories of human (and droid) error and bad design choices that happen in real life too, with the software of our digital systems that we rely on more and more.

In this talk, we’ll dive into security design flaws and vulnerabilities in Star Wars, see why they could also happen to you, and find out how we can fix these issues.

You will learn hacker techniques, common security vulnerabilities and secure design thinking, and even a social engineering Jedi mind trick or two. You can apply these takeaways in securing your software with technical solutions and processes. The ideas also apply in testing the defenses of a system with penetration testing or red teaming.

This Session belongs to the Diese Session gehört zum Programm vom BerlinBerlin program. Take me to the program of . Hier geht es zum Programm von London London .

Take me to the full program of Zum vollständigen Programm von Berlin Berlin .

This Session belongs to the Diese Session gehört zum Programm vom BerlinBerlin program. Take me to the program of . Hier geht es zum Programm von New York New York .

This Session belongs to the Diese Session gehört zum Programm vom BerlinBerlin program. Take me to the program of . Hier geht es zum Programm von Singapore Singapur .

This Session belongs to the Diese Session gehört zum Programm vom BerlinBerlin program. Take me to the program of . Hier geht es zum Programm von Munich München .

This Session Diese Session belongs to the gehört zum Programm von BerlinBerlin program. Take me to the current program of . Hier geht es zum aktuellen Programm von London London , Berlin Berlin , New York New York , Singapore Singapur or oder Munich München .

Stay tuned:

Behind the Tracks

 

Kubernetes Ecosystem

Docker, Kubernetes & Co

Microservices & Software Architecture

Maximize development productivity

Continuous Delivery & Automation

Build, test and deploy agile

Cloud Platforms & Serverless

Cloud-based & native apps

Monitoring, Traceability & Diagnostics

Handle the complexity of microservices applications

Security

DevSecOps for safer applications

Business & Company Culture

Radically optimize IT

Organizational Change

Overcome obstacles on the way towards DevOps

Live Demo #slideless

Showing how technology really works