Difference between revisions of "Linux Security Summit 2015/Schedule"
Jump to navigation
Jump to search
JamesMorris (talk | contribs) |
JamesMorris (talk | contribs) |
||
(22 intermediate revisions by the same user not shown) | |||
Line 16: | Line 16: | ||
|- | |- | ||
|09:05 | |09:05 | ||
| '''<span style="color:navy">Keynote:</span>''' Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team | | '''<span style="color:navy">Keynote:</span>''' Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team ''([http://kernsec.org/files/lss2015/giant-bags-of-mostly-water.pdf slides])'' | ||
| [[Linux_Security_Summit_2015/Bio/Kon|Konstantin Ryabitsev, Linux Foundation]] (see also [https://www.linux.com/news/featured-blogs/200-libby-clark/814542-15-reddit-ama-questions-for-kernelorg-sysadmin-konstantin-ryabitsev Reddit AMA]) | | [[Linux_Security_Summit_2015/Bio/Kon|Konstantin Ryabitsev, Linux Foundation]] (see also [https://www.linux.com/news/featured-blogs/200-libby-clark/814542-15-reddit-ama-questions-for-kernelorg-sysadmin-konstantin-ryabitsev Reddit AMA]) | ||
|- | |- | ||
Line 34: | Line 34: | ||
|- | |- | ||
|11:45 | |11:45 | ||
| | |[[Linux_Security_Summit_2015/Abstracts/Moore|Discussion: Rethinking Audit]] ''([http://kernsec.org/files/lss2015/lss-audit_rework-pmoore-082015-r2.pdf slides])'' | ||
| | |[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]] | ||
|- | |- | ||
|''12:45'' | |''12:45'' | ||
Line 41: | Line 41: | ||
|- | |- | ||
|14:00 | |14:00 | ||
|[[Linux_Security_Summit_2015/Abstracts/Reshetova|Assembling Secure OS Images]] | |[[Linux_Security_Summit_2015/Abstracts/Reshetova|Assembling Secure OS Images]] ''([http://kernsec.org/files/lss2015/reshetova.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Reshetova|Elena Reshetova, Intel]] | |[[Linux_Security_Summit_2015/Bio/Reshetova|Elena Reshetova, Intel]] | ||
|- | |- | ||
|14:45 | |14:45 | ||
|[[Linux_Security_Summit_2015/Abstracts/Halcrow|Linux and Mobile Device Encryption]] | |[[Linux_Security_Summit_2015/Abstracts/Halcrow|Linux and Mobile Device Encryption]] ''([http://kernsec.org/files/lss2015/halcrow.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Halcrow|Paul Lawrence and Mike Halcrow, Google]] | |[[Linux_Security_Summit_2015/Bio/Halcrow|Paul Lawrence and Mike Halcrow, Google]] | ||
|- | |- | ||
Line 72: | Line 72: | ||
|- | |- | ||
|09:45 | |09:45 | ||
|[[Linux_Security_Summit_2015/Abstracts/Manolov|IMA/EVM: Real Applications for Embedded Networking Systems]] | |[[Linux_Security_Summit_2015/Abstracts/Manolov|IMA/EVM: Real Applications for Embedded Networking Systems]] ''([http://kernsec.org/files/lss2015/ima-applications-slides.pdf slides])'' | ||
| [[Linux_Security_Summit_2015/Bio/Baushke|Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks]] | | [[Linux_Security_Summit_2015/Bio/Baushke|Petko Manolov, Konsulko Group, and Mark Baushke, Juniper Networks]] | ||
|- | |- | ||
Line 79: | Line 79: | ||
|- | |- | ||
|10:45 | |10:45 | ||
|[[Linux_Security_Summit_2015/Abstracts/Vander_Stoep|Ioctl Command Whitelisting in SELinux]] | |[[Linux_Security_Summit_2015/Abstracts/Vander_Stoep|Ioctl Command Whitelisting in SELinux]] ''([http://kernsec.org/files/lss2015/vanderstoep.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/VanderStoep|Jeffrey Vander Stoep, Google]] | |[[Linux_Security_Summit_2015/Bio/VanderStoep|Jeffrey Vander Stoep, Google]] | ||
|- | |- | ||
|11:30 | |11:30 | ||
|[[Linux_Security_Summit_2015/Abstracts/Kasatkin|IMA/EVM on Android Device]] | |[[Linux_Security_Summit_2015/Abstracts/Kasatkin|IMA/EVM on Android Device]] ''([http://kernsec.org/files/lss2015/LSS2015_IMA_EVM_On_Android.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Kasatkin|Dmitry Kasatkin, Huawei Technologies]] | |[[Linux_Security_Summit_2015/Bio/Kasatkin|Dmitry Kasatkin, Huawei Technologies]] | ||
|- | |- | ||
Line 94: | Line 94: | ||
|- | |- | ||
|13:50 | |13:50 | ||
|Subsystem Update: AppArmor | |Subsystem Update: AppArmor ''([http://kernsec.org/files/lss2015/lss-apparmor-update-2015.odp slides])'' | ||
|John Johansen, Canonical | |[[Linux_Security_Summit_2015/Bio/Johansen|John Johansen, Canonical]] | ||
|- | |- | ||
|14:10 | |14:10 | ||
|Subsystem Update: Integrity | |Subsystem Update: Integrity ''([http://kernsec.org/files/lss2015/LSS2015-LinuxIntegritySubsystemStatus.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Zohar|Mimi Zohar, IBM]] | |[[Linux_Security_Summit_2015/Bio/Zohar|Mimi Zohar, IBM]] | ||
|- | |- | ||
Line 105: | Line 105: | ||
|- | |- | ||
|14:40 | |14:40 | ||
|Subsystem Update: SELinux | |Subsystem Update: SELinux ''([http://kernsec.org/files/lss2015/lss-state_of_selinux-pmoore-082015-r1.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]] | |[[Linux_Security_Summit_2015/Bio/Moore|Paul Moore, Red Hat]] | ||
|- | |- | ||
|15:00 | |15:00 | ||
|Subsystem Update: Capabilities | |Subsystem Update: Capabilities ''([http://kernsec.org/files/lss2015/capa.pdf slides])'' | ||
| [[Linux_Security_Summit_2015/Bio/Hallyn|Serge Hallyn, Canonical]] | | [[Linux_Security_Summit_2015/Bio/Hallyn|Serge Hallyn, Canonical]] | ||
|- | |- | ||
|15:20 | |15:20 | ||
|Subsystem Update: Seccomp | |Subsystem Update: Seccomp ''([http://kernsec.org/files/lss2015/seccomp.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/Cook|Kees Cook, Google]] | |[[Linux_Security_Summit_2015/Bio/Cook|Kees Cook, Google]] | ||
|- | |- | ||
Line 123: | Line 123: | ||
| colspan="2"|<span style="color:darkgreen">''Break''</span> | | colspan="2"|<span style="color:darkgreen">''Break''</span> | ||
|- | |- | ||
|16: | |16:20 | ||
|[[Linux_Security_Summit_2015/Abstracts/ | | [[Linux_Security_Summit_2015/Abstracts/Gillespie_GRR|GRR Rapid Response: Remote Live Forensics for Incident Response]] ''([http://kernsec.org/files/lss2015/GRR.pdf slides])'' | ||
|[[Linux_Security_Summit_2015/Bio/ | | [[Linux_Security_Summit_2015/Bio/Gillespie|Sean Gillespie, CrowdStrike]] | ||
|- | |- | ||
|''17:00'' | |''17:00'' | ||
|colspan="2"|<span style="color:darkgreen">''Finish''</span> | |colspan="2"|<span style="color:darkgreen">''Finish''</span> | ||
|} | |} |
Latest revision as of 18:05, 26 August 2015
Schedule
Note: LSS will be held in the Jefferson Room, 4th Floor, Union St Tower
Day 1 (Thursday 20th August)
Time | Title | Presenter |
---|---|---|
09:00 | Welcome | James Morris, Oracle |
09:05 | Keynote: Giant Bags of Mostly Water - Securing your IT Infrastructure by Securing your Team (slides) | Konstantin Ryabitsev, Linux Foundation (see also Reddit AMA) |
09:55 | Break | |
10:00 | CC3: An Identity Attested Linux Security Supervisor Architecture (slides, paper) | Greg Wettstein, IDfusion |
10:45 | SELinux in Android Lollipop and Android M (slides) | Stephen Smalley, NSA |
11:30 | Break | |
11:45 | Discussion: Rethinking Audit (slides) | Paul Moore, Red Hat |
12:45 | Lunch | |
14:00 | Assembling Secure OS Images (slides) | Elena Reshetova, Intel |
14:45 | Linux and Mobile Device Encryption (slides) | Paul Lawrence and Mike Halcrow, Google |
15:30 | Break | |
16:00 | Discussion: Core Infrastructure Initiative (slides) | Emily Ratliff, Linux Foundation |
17:00 | Finish |