ethics and security
Showing 6 out of 6 results
Expert Talk: Hack Like a Pro: Bug Bounties, Web Vulnerabilities & More!
Join us for an engaging conversation between Ben Sadegiphour, VP of Research at Hadrian Security, and Julian Wood, Developer Advocate at AWS. In this conversation, we will explore a range of captivating topics, such as: Bug bounties, ethical hacking, Skills, Resources, tips and much more. Whether you're an aspiring ethical hacker or simply interested in the fascinating world of cybersecurity, this video is packed with knowledge and practical advice. Get ready to hack like a pro, learn how you can convert bug bounty hunting into a passive income while you sleep and join us on this exciting journey to make the online world a safer place!

Secure by Design – the Architect’s Guide to Security Design Principles
Security is an ever more important topic for system designers. As our world becomes digital, today’s safely-hidden back office system is tomorrow’s public API, open to anyone on the Internet with a hacking tool and time on their hands. So the days of hoping that security is someone else’s problem are over. The security community has developed a well understood set of principles used to build systems that are secure (or at least securable) by design, but this topic often isn’t included in the training of software developers, assuming that it’s only relevant to security specialists. In this talk, we will briefly discuss why security needs to be addressed as part of architecture work and then introduce a set of proven principles for the architecture of secure systems, explaining each in the context of mainstream system design, rather than in the specialised language of security engineering. Our technical examples will be Java centric, but the principles are equally applicable to other technology stacks. **What will the audience learn from this talk?**<br> The attendees at this talk will learn why security principles are an effective way to share security knowledge and leave with a set of 10 key security principles that they can use to guide security work on their projects. **Does it feature code examples and/or live coding?**<br> No, most of the principles are at application design level, so we illustrate them using a simple example application. **Prerequisite attendee experience level:** <br> [Level 200](https://gotober.com/2019/pages/experience-level)

HORRORLARITY
Whether to laugh or to cry, or both at the same time? Working in IT security can lead to some very mixed emotions. We will revisit some of the speaker's favourite security vulnerabilities, to laugh, and maybe cry, together. We will cover things like the app-enabled toilet with crap security, the shockingly bad smart grid system, and the open source repository that was really, REALLY open. **What will the audience learn from this talk?**<br> You will learn some things you shouldn't do, if you don't want to be ridiculed on stage. **Does it feature code examples and/or live coding?**<br> There will be some minor code examples. They may prove damaging to your optic nerves, though. **Prerequisite attendee experience level:** <br> [Level 100](https://gotober.com/2019/pages/experience-level): While some basic knowledge of coding is beneficial, no previous security experience is necessary.

One Phish, Two Phish, Red Phish, Blue Phish
Society is changing. Consumers value their personal data and will actively avoid organisations that do not treat cyber security seriously. Words alone, are no longer enough. So how, when things feel more like they fail by design, can you improve your ability to protect your critical data. We often say that effective cyber security cannot exist without strong human firewalls. The same holds true for cyber security teams. The most effective cyber security functions hold one thing in common, and it is not cutting-edge technology. It’s high performing teams with a diverse set of talents. In this talk Zoë Rose is going to talk about the importance of varied skills and expertise when it comes to effective cyber resilience, incident response and innovation. **What will the audience learn from this talk?**<br> * You will learn where technology and security/ privacy currently is, how we got here, and what the future holds for us * How we can make a difference in our personal and professional lives to empower ourselves and our consumers. * Diversity vs inclusion, and how we can use it to make more secure solutions, whilst being a more effective business **Does it feature code examples and/or live coding?**<br> No. **Prerequisite attendee experience level:** <br> [Level 200](https://gotober.com/2019/pages/experience-level)

Think like a Hacker
Much in the same way that to secure a house it helps to know how to break in, knowing how to attack our systems will help us secure them. You have a lot of data in your organisations. Whether you think it's sensitive or not, it has value. Whether an attacker wants data for profit, a grudge, or just for fun we need to ensure that we don't just leave the door open for them to take what they want. In this session we'll start to think like a hacker. The what, why, who, where and how of an attacking mindset will leave you with practical steps you can take away and use to start protecting your systems a little better. **What will the audience learn from this talk?**<br> The audience will learn the things an attacker thinks through when looking at a system. "What do I want? Why do I want it? Who has it? Where is it? How do I get it?" **Does it feature code examples and/or live coding?**<br> There may be some basic code examples - and no live coding **Prerequisite attendee experience level:** <br> [Level 100](https://gotober.com/2019/pages/experience-level)

Building a Self-driving RC Car
This session will share my experiences in converting a small remote controlled car into an autonomous driving vehicle. I'll talk about electronics, sensors, AI, computer vision and of course, the software that ties everything together. I'll introduce you into the world of self driving cars and compare my solution to the stuff that is done in the big leagues by the likes of Tesla's 'autopilot' and Waymo's self driving cars. I'll explain the challenges that have to be faced and the dilemma's that come with creating a car being driven by software in real world scenarios. **What will the audience learn from this talk?**<br> You will learn about electronics, computer vision (OpenCV and Java), challenges for self-driving cars (both in the project and the real world) and the ethics of using AI to (partly) replace tasks normally conducted by humans. **Does it feature code examples and/or live coding?**<br> Yes, I will show code of the computer vision pipeline we built. **Prerequisite attendee experience level:** <br> [Level 200](https://gotober.com/2019/pages/experience-level)
