Events Add an event Speakers Talks Collections
 

Speakers

Sort by
Newest
Trending
1-30 of 176
1-30 of 176
Filter
David Wu
Founder at TAUCOIN.io
2021, attention, bitcoin, blockchain, communication, communication protocol, computing, consensus (computer science), contract, crypto, cryptocurrency, david wu, decentralization, denial-of-service attack, ethereum, fee, information, keynote, live, london, metadata, misinformation, perishable proof of transactions - new consensus for day to day dapps - david wu (taucoin.io), prison, public-key cryptography, randomness, reason, recycling, snapchat, taucoin.io, technology, telephone, telephone number, token2049, user datagram protocol
Vinayaka Pandit
Researcher at TCS Research
abstraction, api, blockchain, blockchain explained, blockchain for business, blockchain technology, blockchain training, blockchain tutorial, blockchain tutorial for beginners, cargo, communication, communication protocol, concept, consensus (computer science), contributing to open source, cryptography , decentralization, denial-of-service attack, design, hyperledger, hyperledger blockchain, hyperledger fabric, hyperledger in blockchain, hyperledger projects, information, infrastructure, insurance, interoperability, introduction to hyperledger, law, letter of credit, linux, logistics, online chat, open source, open source software, payment system, regulation, social network, supply chain, technology, what is blockchain, what is hyperledger, what is open source
Lars Klint
Senior Train Architect at Cloud Guru
cloud computing, cloudflare, data center, denial-of-service attack, desktop environment, interest, laptop, linux, load testing, macos, microservices, microsoft, microsoft azure, microsoft visual studio, microsoft windows, platform as a service, property, research, runtime system, server (computing), software , software framework, visual studio code, web service, whatsapp
Mustafa Toroman
Solution Architect, Azure MVP at CLOUDEON
actor, application security, application software, attention, backup, central processing unit, cloud computing, community, computer file, computer network, computer security, computing, continuous integration, cross-platform software, darknet, data center, database, denial-of-service attack, devops, ecosystem, encryption, hewlett-packard, html, information sensitivity, library, microsoft, microsoft excel, microsoft visual studio, microsoft windows, natural environment, open source, operating system, package manager, password, penetration test, percentage, scalability, software , software framework, tablet (pharmacy), technology, test-driven development, twitter, version control, web application, world wide web, youtube
Vamshidhar Kommineni
Group Product Manager at Microsoft
azure, build, c++, c1x9, cloud computing, computer data storage, computing, content delivery network, database, denial-of-service attack, elasticsearch, file system, gateway (telecommunications), java (programming language), kubernetes , machine learning, microsoft, microsoft azure, microsoft build, microsoft build 2021, microsoft developer, modernize your applications with azure storage | od509, msft build, msft build 2021, network file system, object storage, od509, on-demand, publish–subscribe pattern, serverless computing, single-page application, snapshot (computer storage), solid-state drive, synchronization (computer science), transcoding, upload, vamshi kommineni, vybava ramadoss
Lukas Larsson
VM Core Committer at IT
32-bit computing, 64-bit computing, airline codes, application software, array data structure, assembly language, asynchronous communication, binary file, bit, branch predictor, c (programming language), central processing unit, communication, compiler, computer, concurrency (computer science), conditional (computer programming), constant folding, control flow, cross-platform software, denial-of-service attack, doubly linked list, email, embedded system, emotion, emulator, error, executable, future, garbage collection (computer science), gnu compiler collection, hash function, hotspot (virtual machine), imessage, information, instruction pipelining, instruction set architecture, integer, interpreter (computing), ios, javascript, just-in-time compilation, language, latency (engineering), linked list, linux, linux distribution, linux kernel, llvm, lock (computer science), lock (water navigation), machine code, message passing, message queue, microsoft visual studio, microsoft windows, mining, modular programming, network socket, operating system, patch (computing), personal computer, phonograph record, pointer (computer programming), powerpc, prediction, profile-guided optimization, profiling (computer programming), program counter, program optimization, python (programming language), queue (abstract data type), reason, recursion (computer science), red–black tree, research, runtime system, scheduling (computing), server (computing), signal, skip list, software bug, software release life cycle, static single assignment form, string (computer science), subroutine, substring, switch statement, synchronicity, thread (computing), ubuntu, violence, virtual machine, x86, x86-64
Joe Krull
Senior Analyst - Cybersecurity at Aite Group
api, application security, bug bounty program, computer security, cybercrime, cybersecurity, database, denial-of-service attack, devops, digital economy, email, facebook, http cookie, information, information sensitivity, infosec, internet of things, mobile app, penetration test, privacy, rsa, rsac, rsaconference, salesforce, security, traffic analysis, twitter, venmo, waze, world wide web, zoom (software)
Stephen Sailor
Technical Architect at CleanSlate
adobe inc., alexa, amazon alexa, amazon echo, amazon echo show, amazon elastic compute cloud, amazon web services, apple inc., authenticator, automation, autoscaling, aws, cache (computing), certificate authority, chatbot, cloud, cloud computing, cloud conference, cloudfront, cname record, command-line interface, computer file, cortana, debugging, denial-of-service attack, domain name system, dynamic web page, google authenticator, google nest (smart speakers), hardware, home automation, hotspot (wi-fi), http cookie, hypertext transfer protocol, iot, load balancing (computing), media server, mobile app, one-time password, password, public key certificate, siri, six feet up, sixfeetup, slack (software), smart speaker, smart tv, speech synthesis, speech synthesis markup language, spotify, streaming media, subroutine, time to live, transport layer security, virtual, virtual conference, web hosting service, web traffic, website, world wide web
Marco Coulter
Technology Evangelist at B2B Cubed
app migration, apple inc., application software, asynchronous, audit, automation, bank, bank statement, behavior, brand, business, caching patterns, capacity planning, central processing unit, cgroups, cloud computing, cloud sidecar, clusters gitops, computer, computing, consumer behaviour, consumption (economics), curiosity, customer experience, data lakes, demand, denial-of-service attack, distributed database, economics, engineering, experiment, feeling, fintech, flagger , fluentd save, flux2 multi-cloud, future, galls law, gatekeeper, gating service, graalvm, graviton2, happiness, hdfs, health check, hedonism, history, iam reliability, information, infrastructure drift, jevons paradox, jumpstart, kotlin, kubernetes cloud, load balancing (computing), mathematics, microservice, microservices, microsoft, mind, multi-cloud magic, need for speed, news, news feed, opa, open liberty, operating system, pipelines ci/cd, poilcy-as-code, prediction, public cloud, quarkus, reason, research, scientific method, serverless, software , software testing, steam (service), system, technology, telemetry, vegemite, youtube
Matt Jarvis
Director, Developer Relations at Snyk
android (operating system), app migration, application security, application software, asynchronous, authentication, automation, caching patterns, cgroups, cloud computing, cloud sidecar, clusters gitops, computer, computing, continuous delivery, continuous integration, data lakes, denial-of-service attack, distributed database, distributed version control, exploit (computer security), fintech, flagger , fluentd save, flux2 multi-cloud, galls law, gatekeeper, gating service, graalvm, graviton2, hdfs, health check, iam reliability, infrastructure drift, javascript, jumpstart, kotlin, kubernetes , kubernetes cloud, microservice, multi-cloud magic, multi-factor authentication, need for speed, npm (software), opa, open liberty, operating system, patent, pipelines ci/cd, poilcy-as-code, public cloud, quarkus, reason, serverless, single source of truth, software , software development, superuser, telemetry, vulnerability (computing)
Mofizur Rahman
Senior Developer Advocate at Vonage
access control, app migration, asynchronous, automation, caching patterns, cgroups, cloud sidecar, clusters gitops, data lakes, database, denial-of-service attack, distributed database, email, file system, fintech, flagger , fluentd save, flux2 multi-cloud, galls law, gatekeeper, gating service, go (programming language), graalvm, graviton2, hacker, hdfs, health check, iam reliability, infrastructure drift, internet, java (programming language), jumpstart, kotlin, kubernetes , kubernetes cloud, linux, lock picking, microservice, multi-cloud magic, need for speed, opa, open liberty, password, pipelines ci/cd, poilcy-as-code, public cloud, quality of service, quarkus, research, role-based access control, scheduling (computing), serverless, software , software bug, superuser, telemetry, transport layer security, web beacon, world wide web, zero-day (computing)
Rachel Myers
Google engineer at Google
#googleio, access control, amd crossfire, android (operating system), anonymous (hacker group), api, authentication, avatar (computing), baking, brute-force attack, cloud computing, computer data storage, computer file, database, debugging, denial-of-service attack, deployment environment, email, engineer, evaluation, firebase, firebase cloud messaging, firebase developers, firebase emulator suite, firebase emulator ui, firebase storage emulator, google, google announcement, google conference, google developer conference, google firebase, google i/o, google io, inventory, ios, json web token, library, mobile app, multi-factor authentication, new features in firebase 2021, password, pr_pr: google i/o, proprietary software, purpose: educate, ransomware, representational state transfer, scope (computer science), security token, server (computing), serverless security modeling, simulation, sms, software bug, software development kit, software release life cycle, storage emulator android, strategy guide, type: conference talk (full production), unit testing, updates to firebase 2021, upload, vulnerability (computing)
Jonathan Skrip
Software Engineer at Google
access control, anonymous (hacker group), api, authentication, brute-force attack, cloud computing, database, denial-of-service attack, email, firebase, firebase cloud messaging, json web token, mobile app, multi-factor authentication, password, proprietary software, ransomware, representational state transfer, scope (computer science), security token, server (computing), serverless security modeling, sms, software development kit, unit testing, vulnerability (computing)
Rob Martin
Chief Architect at Google
aaa game companies, activision, activision blizzard, advertising, ai, ai/ml, alex hutchinson (video game director), analytics, android (operating system), api, arm architecture, artificial intelligence, call of duty, carbon neutrality, cloud computing, cloud next '20, cloud next 2020, cluster analysis, coding, collaboration, computer network, consumer data, core data infrastructure, crowdsourcing, cryengine, data analytics, data center, data warehouse, database, denial-of-service attack, desktop computer, developers, early access, edge computing, encryption, engagement, entertainment, firebase, forecasting, free-to-play, game developers, game development conference, game development event, game engine, game hosting infrastructure, games, games and apps, games developer summit, games developer summit 2020, games developer summit keynote, gaming infrastructure, gaming innovations, gdc 2020, gdc 2020 keynote, ggds, ggds 2021, google, google analytics, google cloud, google cloud next, google cloud next 2020, google cloud platform, google cloud releases, google developers, google for games, google for games 2021, google game development, google games, google gdc '20, google gdc 2020, google gdc 2020 keynote, google hangouts, google play, google stadia, google workspace, googleforgames, graphics processing unit, industry insight, infrastructure, innovation, insights library, internet, internet protocol, jacques erasmus, jade raymond, kubernetes , laptop, machine learning, marketing research, metadata, microsoft visual studio, microtransaction, mobile game, mobile operating system, mobile payment, multi-factor authentication, new cloud releases, new features, new releases, news, online game, open-source software, open-source-software movement, pandemic, patch (computing), player experiences, pr_pr: google for games, profiling (computer programming), program optimization, purpose: inform, remote content development, scalability, server (computing), serverless computing, shopping insights, software testing, spanner (database), sql, streaming media, technological convergence, type: conference talk (full production), unity (game engine), unreal engine, video game, what's new with gdc, what's new with google cloud, workstation
Adam Shostack
President at Shostack & Associates
accessibility, active listening, adobe photoshop, adversarial machine learning, advertising, agile software development, amazon (company), amazon web services, android (operating system), anxiety, appsec, appseccali, archaeology, attention, audit, authentication, behavior, belief, biometrics, blog, body language, brainstorming, buffer overflow, c++, categorization, closed-circuit television, cloud computing, cloud computing security, computer network, computer security, contract, conversation, credit, credit card, cross-site scripting, cryptocurrency, data security, database, denial-of-service attack, design, dialogue, empowerment, encryption, experiment, expert, facebook, facial recognition system, gamification, general data protection regulation, gesture, information privacy, internet, internet of things, internet privacy, knowledge, laboratory, law, learning, machine learning, microphone, microservices, microsoft visual studio, mobile app, multi-factor authentication, news, online chat, opera (web browser), outsourcing, owasp, password, patch (computing), payment card industry data security standard, pci-x, penetration test, peripheral component interconnect, playing card suit, point of sale, positive psychology, privacy, psychology, reason, regulatory compliance, reverse engineering, rsa conference, security, self-driving car, shopify, sms, software bug, software development, software framework, space, spades (card game), static program analysis, system, targeted advertising, test-driven development, theory, thread (computing), threat model, time, transport layer security, twitter, understanding, usability, use case, user experience design, user-centered design, version control, wireless security
Jon-Michael C. Brook
Principal at Guide Holdings LLC
achilles, agamemnon, cloud computing, cloud computing security, cloud threat modeling, database, denial-of-service attack, design, educational technology, elasticsearch, encryption, greek mythology, home alone, kevin mccallister, marv (sin city), misuse case, privacy, risk, social engineering (security), software assurance, threat model, trojan horse, troy, vulnerability (computing)
Randall Brooks
Engineering Fellow at Raytheon Intelligence, Information and Services
200 - intermediate, achilles, agamemnon, agile software development, amazon elastic compute cloud, amazon web services, antivirus software, application security, automation, aws, aws cloud, aws re:inforce, aws re:inforce 2019, aws re:inforce 2019 sessions, aws security, bill gates, buffer overflow, center for internet security, chef (software), cloud, cloud computing, cloud computing security, cloud security, cloud security community, cloud threat modeling, compliance, computer programming, data protection, database, denial-of-service attack, design, detective controls, devops, educational technology, elasticsearch, encryption, fnd217, governance, greek mythology, home alone, identity, incident response, infrastructure as code, infrastructure security, kevin mccallister, learning conference, marv (sin city), microsoft, misuse case, operating system, patch (computing), patch tuesday, privacy, reverse engineering, risk, secure coding, security, security best practices, session, social engineering (security), software , software assurance, software bug, software development process, the foundation, threat model, transport layer security, trojan horse, troy, vulnerability (computing), waterfall model
Rik Ferguson
VP at Trend micro
3d printing, 5g, analytics, automation, cashless society, computer security, cyberattack, cybercrime, denial-of-service attack, digital twin, education, europol, incident management, information security, internet of things, logistics, machine learning, machine to machine, narrative, privacy, provisioning (telecommunications), ransomware, risk, surveillance
Victoria Baines
Visiting Research Fellow at Oxford University
3d printing, 5g, analytics, automation, cashless society, computer security, cyberattack, cybercrime, denial-of-service attack, digital twin, education, europol, incident management, information security, internet of things, logistics, machine learning, machine to machine, narrative, privacy, provisioning (telecommunications), ransomware, risk, surveillance
Arthur Fontaine
Product & Solution Marketing Manager at NetWitness
access control, analytics, authentication, cloud computing, communication protocol, computer network, computer security, computing, cybersecurity, data distribution service, database, denial-of-service attack, edge computing, gateway (telecommunications), information, information security, infosec, internet of things, interoperability, linux foundation, machine to machine, microservices, mqtt, open platform communications, privacy, product lifecycle, reliability engineering, rsa, rsac, rsaconference, security
Erez Yalon
Head of Security Research at Checkmarx
access control, api, application security, application software, authentication, client (computing), cloud computing, communication protocol, computer network, cybersecurity, database, denial-of-service attack, design, html, information, infosec, interface (computing), knowledge, reason, research, rsa, rsac, rsaconference, security, server (computing), single-page application, software , technology, user (computing), web application, web browser, world wide web
Rafael Garcia
Senior Information Security Consultant at El Paso Electric Company
artificial cardiac pacemaker, cloud computing, computer network, computer security, cyberattack, cybercrime, cybersecurity, cyberwarfare, data security, denial-of-service attack, due diligence, electrical grid, identity management, information, information security, infosec, internet, internet of things, malware, medical device, negotiation, operations management, privacy, ransomware, risk, risk management, rsa, rsac, rsaconference, security, situation awareness, vulnerability (computing)
Scott Jarkoff
Director, Strategic Threat Advisory Group, APJ & EMEA at CrowdStrike
apple inc., automation, best practice, bribery, cybersecurity, denial-of-service attack, engineering, espionage, information, infosec, intellectual property, intelligence, internet, learning, leverage (finance), mind, organization, physical security, probation, property, ransomware, reason, research, rsa, rsac, rsaconference, security, social engineering (security), social media, space, supply chain
Jason Rivera
Director, Strategic Threat Advisory Group at CrowdStrike
android (operating system), apple inc., automation, best practice, bribery, cloud computing, computer security, credential, cybersecurity, cyberwarfare, denial-of-service attack, engineering, espionage, extortion, gateway (telecommunications), health, health technology, information, infosec, intellectual property, intelligence, internet, internet protocol, learning, leverage (finance), microsoft windows, mind, mobile app, national security, operating system, organization, personal data, phishing, physical security, probation, property, public health, ransomware, reason, research, rsa, rsac, rsaconference, security, siri, social engineering (security), social media, space, supply chain, telecommuting, thought, vulnerability (computing), world wide web
Jane Walerud
Serial Entrepreneur | Private investor at Walerud Ventures
cisco systems, competitive advantage, conversation, credibility, customer, denial-of-service attack, distributed computing, education, entrepreneurship, innovation, interest, knowledge, market (economics), persuasion, property, python (programming language), real-time computing, routing, software testing, space, startup company, supply chain, team, telecommuting, venture capital
William King
CTO & cofounder at Subspace
cisco systems, competitive advantage, conversation, credibility, customer, denial-of-service attack, distributed computing, education, entrepreneurship, innovation, interest, knowledge, market (economics), persuasion, property, python (programming language), real-time computing, routing, software testing, space, startup company, supply chain, team, telecommuting, venture capital
Rob Mee
Founder at Pivotal Labs and Geometer
cisco systems, competitive advantage, conversation, credibility, customer, denial-of-service attack, distributed computing, education, entrepreneurship, innovation, interest, knowledge, market (economics), persuasion, property, python (programming language), real-time computing, routing, software testing, space, startup company, supply chain, team, telecommuting, venture capital
Veezhinathan Kamakoti
Professor at IIT Madras
automated teller machine, bank, big data, black market, car, computer, computer security, computer vision, concept, cyberattack, cybersecurity, data, deep learning, denial-of-service attack, economy, email, evolution, intelligence, interest, learning, money, neural network, patent, workplaces
Xingyu Chen
Software Engineer at Facebook
accuracy and precision, advertising, airfield traffic pattern, antenna (radio), authentication, bit, book, cactus, casino, ciphertext, clock, communication, communication channel, compiler, conference, contract, cougar, cryptography , data structure, denial-of-service attack, devices, dispatch (logistics), electric battery, energy, engine, epistle to the galatians, experiment, face, fingerprint, hash function, internet protocol, ip address, memory, mouse, network, network packet, open access, overhead (business), paper, podcast, protein, question, radio-frequency identification, rc circuit, research, resource, sequence, siri, speech recognition, tax, technology, time, tracking system, usenix, worksheet
Dustin Ingram
Member at Python Packaging Authority
application programming interface, application software, argument, assignment (computer science), best practice, boolean data type, bracket, class (computer programming), compiler, computational science, computer, computer file, computer keyboard, computing, conditional (computer programming), control flow, cryptographic hash function, cyberwarfare, data, denial-of-service attack, django, django (web framework), djangocon, djangocon us, documentation, domain name, domain-specific language, dropbox (service), dustin ingram, dustin ingram python, facebook, floating-point arithmetic, for loop, function (mathematics), github, gnu compiler collection, gradual typing, heat, https, icon (computing), installation (computer programs), java (programming language), javascript, language, library (computing), linux, linux distribution, linux kernel, list comprehension, logic, magic number (programming), makefile, malware, man-in-the-middle attack, mass, metadata, mission critical, modular programming, nothing, object (computer science), package manager, parameter (computer programming), password, patch (computing), productivity, programmer, pycon us, pycon us 2021, python, python (programming language), python 2021, python code, python community, python software foundation, python software supply chain, python talks 2021, python tutorials 2021, reason, regular expression, return statement, rpm package manager, ruby (programming language), science, scope (computer science), scripting language, social engineering (security), software , software bug, software framework, software repository, software supply chain, source code, source lines of code, spamming, static, static typing, string (computer science), subroutine, supply chain attack, talk by dustin ingram, trade-off, truth, twitter, type class, type signature, type system, typescript, typing, unification (computer science), unit testing, variable (computer science), web of trust, world wide web, zip (file format)
1 2 3 4 5 6
1-30 of 176