Presentations

CyberChef is known as the “The Cyber Swiss Army Knife” and is a simple, intuitive web app for carrying out all “cyber” operations within a web browser. The tool enables technical and non-technical analysts to manipulate data in complex ways without dealing with complex tools or algorithms.

Kubernetes is the de facto operating system of the cloud, and more and more organizations are running their workloads on Kubernetes. While Kubernetes offers many benefits, new users may introduce security risks like cluster misconfiguration, leaked credentials, cryptojacking, container escapes, and vulnerable clusters. This workshop will teach you the fundamentals of Kubernetes security, from protecting your cluster to securing your workloads.


Open Source Intelligence (OSINT) is increasing in importance to all areas of Security, particularly Cybersecurity. Organizations use OSINT to hunt for threats and to conduct red team exercises. As the amount of information on the global Internet grows, developing OSINT skills can help attendees to perform better in their jobs and help to secure their organization on multiple levels. This session will present some of the most impactful OSINT techniques and tools, including newer AL and LLM methodologies, in a guided, immersive, hands-on format. The workshop guided and hands-on.

pgBadger is a widely used tool that helps to identify the exact factors slowing down the system, improve SQL for quick wins, and enhance overall system performance. But what if you could do more? Imagine the power of PostgreSQL at your fingertips, which is used for its own log analysis and performance optimization.
Explore the latest features in pgBadger and the tools we built on top of it to unlock a world of possibilities!




Join us for "Taming the Chaos: What's Next in Engineering?" where top tech leaders discuss strategies to streamline development and anticipate future shifts in the realms of open source and AI. This panel, featuring luminaries like Kelsey Hightower, Michael Stahnke (VP Eng at Flox, ex VP at Circle CI), Katherine Druckman (Open Source Security @ Intel) and Ron Efroni (Founder of Flox), will explore effective ways to manage the growing complexity in tech stacks and highlight how AI, open source, and security trends are shaping the future of engineering.
AI systems created and maintained by open-source communities are a natural counterbalance to corporate-owned AI systems. Similarly to SETI@Home, everyone can take some of the unused computing time on their devices, and contribute to a larger system. In this case, it forms a decentralized fabric to replace the storage and computation currently requiring expensive cloud resources from corporate providers.

This session will explore the history of digital resistance through open-source tools, examine different open government approaches with Decidim. We will delve into real-world use cases from Spain, the USA, and Brazil. We will look how local governments have accelerated democratic engagement through open public digital infrastructure. Finally, we will reflect on how we can contribute to building this infrastructure and shaping the future of digital democracy at our level.
While x86 servers certianly dominate the landscape in datacenters, they are not the only option for running an OpenStack environment. We'll discuss some options for installation, and then examine the concrete example of how a dual architecture enivornment works in the IBM Storage Scale lab.

We all know honeypots can reveal interesting details about threat actors and there tactics, but it’s not every day that a threat actors sends you their own credentials. Operational security is hard. In this session, I’ll share how my team and I developed a simple Flask application to emulate an exposed Docker endpoint, and how an everyday log review led to discovery the X-Registry-Auth header. The header turned out to be a DockerHub token. I’ll take you down the rabbit-hole on how my team and I pivoted for additional research and derived some level of attribution.

This talk explores the transition to conscious, dynamic systems and business models in the era of intelligence. By rethinking how workflows, compute, and context flow seamlessly, we move beyond the band-aid approach of containerized apps forced to orchestrate. Instead, we embrace dynamic, natural, adaptive continuums that form the foundation for equitable, scalable, and sustainable agentic ecosystems. Highlighting the diversity of AI, expanding beyond LLM-generated responses from a single vendor to a butterfly effect triggered by events that transcend the physical world.