Difference between revisions of "Linux Security Summit 2015/Schedule"
Jump to navigation
Jump to search
JamesMorris (talk | contribs) |
JamesMorris (talk | contribs) |
||
Line 45: | Line 45: | ||
|- | |- | ||
|16:00 | |16:00 | ||
|[[Linux_Security_Summit_2015/Abstracts/Halcrow|Discussion: Linux and Mobile Device Encryption]] | |||
|Paul Lawrence and Mike Halcrow, Google. | |||
|- | |||
|16:30 | |||
| [[Linux_Security_Summit_2015/Abstracts/Ratliff|Discussion: Core Infrastructure Initiative]] | | [[Linux_Security_Summit_2015/Abstracts/Ratliff|Discussion: Core Infrastructure Initiative]] | ||
| Emily Ratliff, Linux Foundation | | Emily Ratliff, Linux Foundation | ||
Line 113: | Line 117: | ||
|- | |- | ||
|16:30 | |16:30 | ||
|[[Linux_Security_Summit_2015/Abstracts/ | |[[Linux_Security_Summit_2015/Abstracts/Moore|Discussion: Rethinking Audit]] | ||
|Paul | |Paul Moore, Red Hat | ||
|- | |- | ||
|''17:00'' | |''17:00'' | ||
|colspan="2"|''Finish'' | |colspan="2"|''Finish'' | ||
|} | |} |
Revision as of 15:41, 1 July 2015
Schedule
Day 1 (Thursday 20th August)
Time | Title | Presenter |
---|---|---|
09:00 | Keynote (TBA) | Some Person, Somewhere |
09:50 | Break | |
10:00 | CC3: An Identity Attested Linux Security Supervisor Architecture | Greg Wettstein, IDfusion |
10:45 | SELinux in Android Lollipop and Android M | Stephen Smalley, NSA |
11:30 | Break | |
11:45 | Linux Incident Response | Mike Scutt and Tim Stiller, Rapid7 |
12:45 | Lunch (self-funded at a nearby location) | |
14:00 | Assembling Secure OS Images (To be confirmed...) | Elena Reshetova, Intel |
14:45 | Security Framework for Constraining Application Privileges | Lukasz Wojciechowski, Samsung |
15:30 | Break | |
16:00 | Discussion: Linux and Mobile Device Encryption | Paul Lawrence and Mike Halcrow, Google. |
16:30 | Discussion: Core Infrastructure Initiative | Emily Ratliff, Linux Foundation |
17:00 | Finish |
Day 2 (Friday 21st August)
Time | Title | Presenter |
---|---|---|
09:00 | Assembling Secure OS Images (TBC) | Elena Reshetova, Intel (TBC) |
09:45 | IMA/EVM: Real Applications for Embedded Networking Systems | Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks |
10:30 | Break | |
10:45 | Ioctl Command Whitelisting in SELinux | Jeffrey Vander Stoep, Google |
11:30 | IMA/EVM on Android Device | Dmitry Kasatkin, Huawei Technologies |
12:15 | Lunch (self-funded at a nearby location) | |
13:30 | Subsystem Update: SELinux | Paul Moore, Red Hat |
13:50 | Subsystem Update: AppArmor | John Johansen, Canonical |
14:10 | Subsystem Update: Integrity | Mimi Zohar, IBM |
14:30 | Break | |
14:50 | Subsystem Update: Smack | Casey Schaufler, Intel |
15:10 | Subsystem Update: Capabilities | Serge Hallyn, Canonical |
15:30 | Discussion: Linux Security Module Stacking Next Steps | Casey Schaufler, Intel |
16:00 | Break | |
16:30 | Discussion: Rethinking Audit | Paul Moore, Red Hat |
17:00 | Finish |