Difference between revisions of "Linux Security Summit 2015/Schedule"

From Linux Kernel Security Subsystem
Jump to navigation Jump to search
Line 13: Line 13:
|-
|-
|''09:50''
|''09:50''
|colspan="2"|''Break''
|colspan="2"|<span style="color:darkgreen">''Break''</span>
|-
|-
|10:00
|10:00
Line 24: Line 24:
|-
|-
|''11:30''
|''11:30''
|colspan="2"|''Break''
|colspan="2"|<span style="color:darkgreen">''Break''</span>
|-
|-
|11:45
|11:45
Line 31: Line 31:
|-
|-
|''12:45''
|''12:45''
|colspan="2"|''Lunch (self-funded at a nearby location)''
|colspan="2"|<span style="color:darkgreen">''Lunch''</span>
|-
|-
|14:00
|14:00
Line 42: Line 42:
|-
|-
|''15:30''
|''15:30''
|colspan="2"|''Break''
|colspan="2"|<span style="color:darkgreen">''Break''</span>
|-
|-
|-
|-
Line 50: Line 50:
|-
|-
|''17:00''
|''17:00''
|colspan="2"|''Finish''
|colspan="2"|<span style="color:darkgreen">''Finish''</span>
|}
|}


Line 69: Line 69:
|-
|-
|''10:30''
|''10:30''
|colspan="2"|''Break''
|colspan="2"|<span style="color:darkgreen">''Break''</span>
|-
|-
|10:45
|10:45
Line 80: Line 80:
|-
|-
|''12:15''
|''12:15''
|colspan="2"|''Lunch (self-funded at a nearby location)''
|colspan="2"|<span style="color:darkgreen">''Lunch''</span>
|-
|-
|13:30
|13:30
Line 95: Line 95:
|-
|-
|''14:30''
|''14:30''
|colspan="2"|''Break''
|colspan="2"|<span style="color:darkgreen">''Break''</span>
|-
|-
|14:40
|14:40
Line 114: Line 114:
|-
|-
|''16:10''
|''16:10''
| colspan="2"|''Break''
| colspan="2"|<span style="color:darkgreen">''Break''</span>
|-
|-
|16:30
|16:30
Line 121: Line 121:
|-
|-
|''17:00''
|''17:00''
|colspan="2"|''Finish''
|colspan="2"|<span style="color:darkgreen">''Finish''</span>
|}
|}

Revision as of 03:13, 2 July 2015

Schedule

Day 1 (Thursday 20th August)

Time Title Presenter
09:00 Keynote (TBA) Some Person, Somewhere
09:50 Break
10:00 CC3: An Identity Attested Linux Security Supervisor Architecture Greg Wettstein, IDfusion
10:45 SELinux in Android Lollipop and Android M Stephen Smalley, NSA
11:30 Break
11:45 Linux Incident Response Mike Scutt and Tim Stiller, Rapid7
12:45 Lunch
14:00 Linux and Mobile Device Encryption Paul Lawrence and Mike Halcrow, Google
14:45 Security Framework for Constraining Application Privileges Lukasz Wojciechowski, Samsung
15:30 Break
16:00 Discussion: Core Infrastructure Initiative Emily Ratliff, Linux Foundation
17:00 Finish

Day 2 (Friday 21st August)

Time Title Presenter
09:00 Assembling Secure OS Images (TBC) Elena Reshetova, Intel (TBC)
09:45 IMA/EVM: Real Applications for Embedded Networking Systems Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks
10:30 Break
10:45 Ioctl Command Whitelisting in SELinux Jeffrey Vander Stoep, Google
11:30 IMA/EVM on Android Device Dmitry Kasatkin, Huawei Technologies
12:15 Lunch
13:30 Subsystem Update: Smack Casey Schaufler, Intel
13:50 Subsystem Update: AppArmor John Johansen, Canonical
14:10 Subsystem Update: Integrity Mimi Zohar, IBM
14:30 Break
14:40 Subsystem Update: SELinux Paul Moore, Red Hat
15:00 Subsystem Update: Capabilities Serge Hallyn, Canonical
15:20 Subsystem Update: Seccomp Kees Cook, Google
15:40 Discussion: Linux Security Module Stacking Next Steps Casey Schaufler, Intel
16:10 Break
16:30 Discussion: Rethinking Audit Paul Moore, Red Hat
17:00 Finish