DevOps Conference
The Conference for Continuous Delivery, Microservices,
Containers, Clouds and Lean Business

What Star Wars Taught Me About Secure System Design

Keynote
Until conference starts:
✓ 4 Day Special
✓ Team discount
✓ Extra specials for freelancers
Register now
Until conference starts:
✓ 4 Day Special
✓ Team discount
✓ Extra specials for freelancers
Register now
Until October 20:
✓ Save up to $233
✓ 4 Day Special
✓ Team discount
Register now
Until October 20:
✓ Save up to $233
✓ 4 Day Special
✓ Team discount
Register now
Until November 3
✓ Save up to 399€
✓ 4 Day Special
✓ Team discount
Register now
Bis 3. November
✓ Sparen Sie bis zu 399 €
✓ 4-Tages-Special
✓ Kollegenrabatt
Jetzt anmelden
Thank you for attending
We see us 2023
or in September in New York
Go to New York
Thank you for attending
We see us 2023
or in September in New York
Go to New York
Thank you for attending
We see us 2023
or in Munich in December 2022
Go to Munich
Danke für Ihre Teilnahme
Wir sehen uns 2023
oder im Dezember in München
Jetzt nach München
Infos

Are movies purely entertainment, or can you learn from them in a fun way? I loved the Star Wars saga as a kid, and my work experience in network and application security has made me enjoy the movies even more. R2D2 mining information, Han Solo getting past a protective shield with old authentication codes, or the Rebellion abusing a single point of failure – besides the space adventure, I see stories of human (and droid) error and bad design choices that happen in real life too, with the software of our digital systems that we rely on more and more. In this talk, we’ll dive into security design flaws and vulnerabilities in Star Wars, see why they could also happen to you, and find out how we can fix these issues. You will learn hacker techniques, common security vulnerabilities and secure design thinking, and even a social engineering Jedi mind trick or two. You can apply these takeaways in securing your software with technical solutions and processes. The ideas also apply in testing the defenses of a system with penetration testing or red teaming.

This Session originates from the archive of Diese Session stammt aus dem Archiv von BerlinBerlin . Take me to the program of . Hier geht es zum aktuellen Programm von New York New York .

This Session originates from the archive of Diese Session stammt aus dem Archiv von BerlinBerlin . Take me to the program of . Hier geht es zum aktuellen Programm von Singapore Singapur .

This Session originates from the archive of Diese Session stammt aus dem Archiv von BerlinBerlin . Take me to the program of . Hier geht es zum aktuellen Programm von Munich München .

This Session originates from the archive of Diese Session stammt aus dem Archiv von BerlinBerlin . Take me to the program of . Hier geht es zum aktuellen Programm von London London .

This Session originates from the archive of Diese Session stammt aus dem Archiv von BerlinBerlin . Take me to the program of . Hier geht es zum aktuellen Programm von Berlin Berlin .

This Session Diese Session originates from the archive of stammt aus dem Archiv von BerlinBerlin . Take me to the current program of . Hier geht es zum aktuellen Programm von New York New York , Singapore Singapur , Munich München , London London or oder Berlin Berlin .

Stay tuned:

Behind the Tracks

 

Kubernetes Ecosystem

Docker, Kubernetes & Co

Microservices & Software Architecture

Maximize development productivity

Continuous Delivery & Automation

Build, test and deploy agile

Cloud Platforms & Serverless

Cloud-based & native apps

Monitoring, Traceability & Diagnostics

Handle the complexity of microservices applications

Security

DevSecOps for safer applications

Business & Company Culture

Radically optimize IT

Organizational Change

Overcome obstacles on the road to DevOps

Live Demo #slideless

Showing how technology really works