NLUUG najaarsconferentie 2022
Locatie, datum en tijden
Van der Valk Hotel Utrecht
Winthontlaan 4-6
3526 KV, Utrecht
The Netherlands
Datum en tijd
Dit evenement vond plaats op dinsdag 29 november 2022 (08:30-18:00).
Presentaties, foto's en opnames
Na de conferentie verzamelen we de opnames en foto's. Nadat ze beschikbaar komen zijn ze te raadplegen via de pagina's in onderstaand programma.
Programma
Tijd
Event
Zaal
Zaal 1
Zaal 2
Zaal 3
08:30
Inschrijving, ontvangst, koffie
1
Inschrijving, ontvangst, koffie
2
Inschrijving, ontvangst, koffie
3
09:15
Openingswoord
1
Openingswoord
2
Openingswoord
3
09:30
Lucinda Sterk
Keynote: Talk nerdy to me
Keynote: Talk nerdy to me
1
Lucinda Sterk
Keynote: Talk nerdy to me
Keynote: Talk nerdy to me
2
Lucinda Sterk
Keynote: Talk nerdy to me
Keynote: Talk nerdy to me
3
10:30
Koffiepauze
1
Koffiepauze
2
Koffiepauze
3
11:00
Riccardo ten Cate en Glenn ten Cate
Exploitation, automation, mitigation
Exploitation, automation, mitigation
1
Mike Ciavarella
This is just temporary
This is just temporary
2
Melchior Aelmans
Exploring quantum Technology for Networking
Exploring quantum Technology for Networking
3
11:45
1
2
3
11:50
Rob Hulsebos
OT Cybersecurity Challenges
OT Cybersecurity Challenges
1
Michiel Leenaars
NLnet and NGI Zero: working for the internet
NLnet and NGI Zero: working for the internet
2
3
12:35
Lunch
1
Lunch
2
Lunch
3
14:00
Francisco Dominguez and Zawadi Done
Automating incindent response should be the default
Automating incindent response should be the default
1
Andreas Hülsing
An update on NIST's PQC standardization process
An update on NIST's PQC standardization process
2
Kris Buytaert
Help My Datacenter is On Fire
Help My Datacenter is On Fire
3
14:45
1
2
3
14:50
Jean-Paul Sablerolle
Power to the Open Source
Power to the Open Source
1
Filip Chyla
Cloud-Native Security with the OWASP Cloud-Native Application Security Top 10
Cloud-Native Security with the OWASP Cloud-Native Application Security Top 10
2
Toshaan Bharvani
Why Open Technologies need to use Open Technologies
Why Open Technologies need to use Open Technologies
3
15:35
Koffiepauze
1
Koffiepauze
2
Koffiepauze
3
16:00
Marcel van der Velde
Heuristic Park (why we can fake it until we make it)
Heuristic Park (why we can fake it until we make it)
1
Ondřej Caletka
Run your own networking lab with Vagrant and Ansible
Run your own networking lab with Vagrant and Ansible
2
Joost van Dijk
From passwords to passkeys: What's new with FIDO
From passwords to passkeys: What's new with FIDO
3
16:45
1
2
3
16:50
-
-
-
1
Marcel Kornegoor
Course as Code: the future of AT Computing's training courses
Course as Code: the future of AT Computing's training courses
2
Joyce Mellens
Caer: An IoT Firewall for consumers
Caer: An IoT Firewall for consumers
3
17:55
Borrel, gesponsord door AT-Computing, en keysigning party (download manual)
1
Borrel, gesponsord door AT-Computing, en keysigning party (download manual)
2
Borrel, gesponsord door AT-Computing, en keysigning party (download manual)
3
Programma (oude format)
We zijn verbeteringen aan het doorvoeren op onze website. Het programma zal hierdoor dubbel worden gepresenteerd, in een moderne versie en als tabel.
Zaal 1 | Zaal 2 | Zaal 3 | |
---|---|---|---|
08:30 | Inschrijving, ontvangst, koffie | ||
09:15 | Openingswoord | ||
09:30 | Lucinda Sterk Keynote: Talk nerdy to me | ||
10:30 | Koffiepauze | ||
11:00 | Riccardo ten Cate en Glenn ten Cate Exploitation, automation, mitigation | Mike Ciavarella This is just temporary | Melchior Aelmans Exploring quantum Technology for Networking |
11:45 | |||
11:50 | Rob Hulsebos OT Cybersecurity Challenges | Michiel Leenaars NLnet and NGI Zero: working for the internet | Sake Blok LOG4SHELL: Getting to know your adversary |
12:35 | Lunch | ||
14:00 | Francisco Dominguez and Zawadi Done Automating incindent response should be the default | Andreas Hülsing An update on NIST's PQC standardization process | Kris Buytaert Help My Datacenter is On Fire |
14:45 | |||
14:50 | Jean-Paul Sablerolle Power to the Open Source | Filip Chyla Cloud-Native Security with the OWASP Cloud-Native Application Security Top 10 | Toshaan Bharvani Why Open Technologies need to use Open Technologies |
15:35 | Koffiepauze | ||
16:00 | Marcel van der Velde Heuristic Park (why we can fake it until we make it) | Ondřej Caletka Run your own networking lab with Vagrant and Ansible | Joost van Dijk From passwords to passkeys: What's new with FIDO |
16:45 | |||
16:50 | - - | Marcel Kornegoor Course as Code: the future of AT Computing's training courses | Joyce Mellens Caer: An IoT Firewall for consumers |
17:55 | Borrel, gesponsord door AT-Computing, en keysigning party (download manual) |