11:05am • ⚡ Lightning Talk: Security Down to the Kernel - Justin Garrison, Sidero Labs
11:10am • ⚡ Lightning Talk: Speak Egress and Exit: A Look at Securing Traffic Out of the Mesh with Istio - Nina Polshakova & Ariana Weinstock, Solo.io
11:15am • ⚡ Lightning Talk: Securing Your Systems with Service Mesh - Tyler Schade, Solo.io
11:20am • ⚡ Lightning Talk: Don’t Make Me Impersonate My Identity - Cynthia Thomas, Google
11:50am • CSI Forensics: Unraveling Kubernetes Crime Scenes - Alberto Pellitteri & Stefano Chierici, Sysdig
1:55pm • Malicious Compliance Automated: Building Secure Containers and Obfuscating What's Inside - Kyle Quest, AutonomousPlane & Duffie Cooley, Isovalent
2:45pm • CVE Context Matters, but Do All Vulnerabilities Really Matter? - Shubha Badve & Ross Tannenbaum, Red Hat
3:50pm • API Security: Code-to-Cloud Context for Complete Protection - Idan Plotnik, Apiiro & Patrick Sullivan, Akamai
4:40pm • Detection Engineering in Kubernetes Environments: Wrangling Security Data Out of Your Clusters! - Dakota Riley, Aquia
9:00am • Keynote: Welcome + Opening Remarks - Chris Aniszczyk, CTO, Cloud Native Computing Foundation
9:15am • Keynote: Demystifying Secure Application Communication with Zero Trust: Identity, Integrity, Confidentiality - Lin Sun, Head of Open Source, solo.io
9:30am • Sponsored Keynote: What Can You Do in 5 Minutes? - Alexander Lawrence, Field CISO, Sysdig
9:35am • Keynote: Security in the Open - How Industry and Community Benefit When Security Thrives in the OSS Landscape - Cailyn Edwards, Senior Security Engineer, Okta & Jonathan Whitaker, Staff Software Engineer, Okta
9:50am • Keynote: K8s Security Safari: Hunting Threats in the Wild Wild Cloud - Stav Ochakovski, DevOps Tech Lead, Mitiga & Ariel Szarf, Senior Cloud Security Researcher, Mitiga
10:05am • Keynote: TAG Security, You're It! - Moderated by Eddie Knight, Sonatype
10:20am • Keynote: Closing Remarks
11:00am • Shadow Vulnerabilities in AI/ML Data Stacks - What You Don’t Know CAN Hurt You - Avi Lumelsky & Nitzan Mousseri, Oligo Security
11:50am • Leveraging Cryptographic Lineage for Context and ConnectedTrust - Yogi Porla, Deep Lineage
1:55pm • Brave New World: Welcoming New AI Identity Challenges - Gabriel L. Manor, Permit.io
2:45pm • Threat Modeling for AI Apps with Attacks as Code - Priyanka Tembey, Operant & Glenn McDonald, Operant AI
3:50pm • Everyone’s Starting to Look SPIFFE: MTLS and Identity with Linkerd and Teleport - Dave Sudia, Teleport
4:40pm • Learn to Navigate the Perils and Pitfalls of Multi-Tenant Identity Infrastructure - Fabienne Bühler & Livio Spring, ZITADEL
11:00am • Scan, Patch, VEX - Using Open Source Tools to Manage Vulnerabilities in Containers - Toddy Mladenov & Sertaç Özercan, Microsoft; Itay Shakury, Aqua Security
11:50am • Securing CI/CD Runners Through eBPF Agent - Mert Coskuner, Yahoo & Cenk Kalpakoglu, Kondukto
1:55pm • Proactive Kubernetes Security: Anomaly Detection and Runtime Alerting in Kubernetes Workloads - Amit Schendel, ARMO & Remi Minnebo, Alter Domus
2:45pm • Kubernetes Deep Dive: Elevating ML Workload Monitoring to Art - Ziwen Ning & Geeta Gharpure, Amazon Web Services
3:50pm • Is the Internet on Fire? Strategies for Mitigating Open Source Software Vulnerabilities - Andrew Martin, ControlPlane & Michael Lieberman, Kusari
4:40pm • Drawing Lines in the Sand, or Running Unprivileged eBPF in Kubernetes - Nikola Grcevski, Grafana Labs
11:00am • Tutorial: Hacking Istio: The Good, the Bad, and the Misconfigured - Nina Polshakova & Peter Jausovec, Solo.io
1:55pm • Implementing a Multi-Tenant, Relationship-Based Authorization Model with OpenFGA - Evan Anderson, Stacklok & María Inés Parnisari, Okta
2:45pm • How Does a Workload Authenticate an API Request?: Implementing Transaction Tokens with Keycloak - Yoshiyuki Tabata, Hitachi, Ltd.
3:50pm • IAM Confused: Decoding 8 Real World Cloud Identity Breaches - Maya Levine, Sysdig
4:40pm • The Story of Crush: The Microservice That Navigated the Cloud Native Ocean with a SPIFFE Identity - Mattias Gees, Venafi & Tom Meadows, Testifysec
11:00am • Amplifying Impact: Documentation and Supply Chain Security - Michelle Irvine, Google Cloud
11:50am • How to Generate VEX Automatically for Your Project - Shlomo Heigh, CyberArk & Ben Hirschberg, ARMO
1:55pm • A Mouthful of Mayhem: Taste Test and Gut Response to SLSA, GUAC, and Supply Chain’s Plat Du Jour - Shane Lawrence, Shopify
2:45pm • End-to-End Encryption for Container Checkpointing in Kubernetes - Radostin Stoyanov, University of Oxford
3:50pm • Implementing AI RMF with Policy-as-Code Automation - Robert Ficcaglia, SunStone Secure; Anca Sailer & Vikas Agarwal, IBM
4:40pm • Cloud Native GRC - Brandt Keller, Defense Unicorns & Jon Zeolla, Zenable
9:00am • Keynote: Opening Remarks
9:05am • Keynote: Securing Kubernetes, the Upstream Way - Rey Lejano, Solutions Architect, Red Hat
9:20am • Keynote: Security Education Through the Art of Storytelling - Ann Wallace, Director of Product Security Education, Okta
9:35am • Keynote: Sugar Ray.io on K8s: Shut the Door, Baby! - Greg Castle, GKE Security Tech Lead, Google & Cynthia Thomas, Product Manager, Google
9:50am • Keynote: A Vision for a Secure Software Supply Chain - Marina Moore, PhD Candidate, New York University
10:05am • Keynote: We’re VEXing the Cloud Native Landscape. Bring Your Code! - Adolfo García Veytia, Staff Software Engineer, Stacklok
10:20am • Keynote: Closing Remarks
11:00am • Container Images & Security 101: 5 Need to Know Facts - Phil Estes, AWS
11:50am • Demystify Modern Signing: Keys, Certs, and Envelopes - John Kjell, TestifySec
1:55pm • Level up Your Security Career with the TAG Security Community - Andrew Martin, ControlPlane
2:45pm • Guardians of the Dataverse: Securing the AI Supply and Data Chain - Frederick Kautz, TestifySec Inc.
3:50pm • From Risks to Resilience: Leveraging CNCF Projects Against Kubernetes' OWASP Top 10 - Alireza Rahmani & Hilliary Lipsig, Red Hat
4:40pm • All I Know About Cybersecurity I Learned from Fungus - Alex Lawrence, Sysdig