Security 2016 Amsterdam was O’Reilly Media’s first ever security conference in Europe. It gathered more than 65 of the top IT security experts from Europe, Silicon Valley, and the rest of the world to offer practical guidance on fending off the malware, spear-phishers, and DDoS attacks plaguing websites and the IoT everywhere. Containing specialized content on Euro-centric concerns like GDPR compliance, this …
Security 2016 Amsterdam was O’Reilly Media’s first ever security conference in Europe. It gathered more than 65 of the top IT security experts from Europe, Silicon Valley, and the rest of the world to offer practical guidance on fending off the malware, spear-phishers, and DDoS attacks plaguing websites and the IoT everywhere. Containing specialized content on Euro-centric concerns like GDPR compliance, this video compilation offers a complete recording of every 40-minute session, 3.5-hour tutorial, and keynote delivered at the conference. You’ll hear from security pros at Google, Immuta, Farsight Security, Cloudera, Normation, PerimeterX, Fireglass, CoreOS, Snyk, Deloitte, Facebook, Lab Mouse, WhiteOps, and many more in this 50+ hour collection of cybersecurity wisdom and hard-knock experience.
Enjoy a front-row view for each of the conference's 46 sessions, 6 tutorials, and 7 keynotes
Hear from 65 of the top IT security experts from Europe and around the world
Watch detailed tutorials on Docker/container security, bot attacks, network forensics, and more
Listen to Google’s Thomas Dullien (aka Halvar Flake) on how to re-architect a defendable Internet
Take in practical GDPR-compliance strategies from Chiara Rustici and Steve Touw (Immuta)
Hear Dyn’s Phil Stanhope describe the DDoS attack on Dyn and the counter-measures to repel it
Watch Don Bailey (Lab Mouse Security) on the must-have processes for defeating IoT attacks
Learn about the value of DNS in cyber investigations from Merike Kaeo (Farsight Security)
Hear the latest on security tools like PAL, rkt, Inspec, Apache Drill, Rudder, and Macaroons
Learn the best practices for spreading security consciousness throughout the enterprise
Scalable threat modeling with risk patterns - Stephen de Vries (ContinuumSecurity)
Speak security and enter: Making security make sense for nontechnical users - Jessy Irwin (Mercury Public Affairs)
Link complex regulation to practical security - Wayne Anderson (Avanade)
Leveraging isolation technologies for improved security and productivity - Dan Amiga (Fireglass) and Dor Knafo (Fireglass)
Talking to the bad guys - Nav Jagpal (Google)
US and EU data security and data privacy issues in M transactions - Shannon Yavorsky (Kirkland Ellis LLP)
The human element
Who owns open source security? - Guy Podjarny (Snyk)
Security through design: Making security better by designing for people - Jelle Niemantsverdriet (Deloitte)
Gamify security training with developer CTFs - Kyle Rankin (Final, Inc.)
Security by consent - Brendan O’Connor (Malice Afterthought, Inc.)
A technical dive into defensive trickery - Dan Kaminsky (White Ops)
Threading the needle of mobile security and user privacy - James Plouffe (MobileIron)
Building a cross-functional incident response team - Jennifer Martin (Covington Burling)
rkt’s architecture and security features - Frederic Branczyk (CoreOS)
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept