Skip to main content
Previous SCALEs
SCALE 21x
SCALE 20x
SCALE 19x
SCALE 18x
SCALE 17x
SCALE 16x
SCALE 15x
SCALE 14x
SCALE 13x
SCALE 12x
SCALE 11x
SCALE 10x
SCALE 9x
SCALE 8x
SCALE 7x
SCALE 6x
SCALE 5x
SCALE 4x
SCALE 3x
SCALE 2x
SCALE 1x
Register
Co-Located Events
Cloud Native Days LA
DevOpsDay LA
PlanetNix
OpenInfra Days
SCALE Youth
Postgres @ SCALE
Kwaai Personal AI Summit
Beginner Linux Training
UbuCon
SunSecCon
OSS Career Day
Birds of a Feather Sessions
Speakers
Presentations
Venue
Call for Presenters
Schedule
Thursday
Friday
Saturday
Sunday
SunSecCon
Adversarial Intelligence: Redefining Application Security through the eyes of an attacker
Roy Talyosef
AI Agents in a Semi-Autonomous Security Operations Center (SOC)
Keyur Rajyaguru
Automated secure mobile code reviews using Danger
Saurabh Sharma
Data Breaches and Dark Secrets: The Corporate Side
Andrew Amaro
That One Time the Threat Actor Sent Me His Token
Andy Giron
SunSecCon Keynote: From IC to Manager....and Then Doing It Again
Anthony Scheller
How To Write A Vulnerability Disclosure
Max vonBlankenburg
Exposed Detection Rules: What’s Next for Defenders?
Kennedy Toomey
SunSecCon Workshop: Kubernetes Security - Hands-On Attack and Defense
Lenin Alevski
SunSecCon Workshop: OSINT for Cybersecurity and Hackers
Sandra Stibbards, Lee McWhorter
1
2
next ›