Sessions

luther hill
Using Data science to solve national security problems.
luther hill

Sharing my experience of how deploying to Iraq and Afghanistan with the Army as a soldier made me a better Data Scientest. Will cover experiences analysizing social media to identify bomb threats. Also covering what’s it’s like to use code to develop actionable intelligence for US troops.

Room: Park Suite
Topics: Soft Skills;
Tags: Big Data; Development Practices; IoT; Project Management; Python; Requirements; Security; Soft Skills

Randall Degges
JSON Web Tokens Suck
Randall Degges

JSON Web Tokens (JWTs) are all the rage in the security world. They’re becoming more and more ubiquitous in web authentication libraries, and are commonly used to store a user’s identity information. In this talk Randall Degges, Head of Developer Advocacy at Okta, will take you on an extensive tour

Room: Churchill
Topics: Application Development
Tags: Security

Scott Addie
Protecting App Secrets with .NET Core and Azure
Scott Addie

Remember the last time you stored an API key or password in plain text in a config file? To make matters worse, that config file made its way into source control too. Now the entire development team knows your sensitive information. How does one improve upon this in an ASP.NET Core app? In this ses

Room: Oaks
Topics: Application Development;
Tags: .NET; Azure; Cloud; Development Practices; Security

Todd Nussbaum
Essential JWT
Todd Nussbaum

Working with RESTful services, and wondering how to secure them? You aren't alone. No one solution works everywhere, but JSON Web Tokens provide a simple and flexible solution for a lot of use cases. JSON Web Tokens are stateless, do not require cookies in the browser, and do not require CSRF pro

Room: Keeneland
Topics: Application Development;
Tags: Java; Security

Deven Phillips
Accelerating Security In A DevOps World
Deven Phillips

DevOps is taking the IT world by storm and as it becomes more common, the scope of work to be improved by DevOps practices is expanding. Over the last 2 years Red Hat's Open Innovation Labs have been working with both public and private sector organizations to help them learn Agile and DevOps practi

Room: Conference Theater
Topics: ;
Tags: Agile; Career Development; Cloud; Containers; Continuous Development; Development Practices; DevOps; Quality Assurance; Security

Ondrej Balas
The ASP.NET Identity Ecosystem from 35,000 feet
Ondrej Balas

With more and newer options appearing every day, it’s getting increasingly more confusing to decide on how your applications will sign in users. Between in-app identity, running your own identity server, or using an IdaaS (Identity as a service) product, there is an overwhelming amount of choice. Bu

Room: Park Suite
Topics: Application Development;
Tags: .NET; Security

Tyler Stephenson
Don't Get H@ck3d
Tyler Stephenson

When is the last time you thought about the security in your app? Exactly... In this session, we'll walk through the OWASP Top 10 and find out how to better secure our .NET web applications.

Room: Keeneland
Topics: Application Development;
Tags: .NET; Security

Randall Degges
Useful Cryptography, An Introduction
Randall Degges

Cryptography is often thought of as a scary topic, but it doesn't have to be. In this talk, you'll learn about different types of useful cryptography, how they work (without needing a PhD in mathematics), and how to immediately start applying these concepts in your projects.

Room: Park Suite
Topics: Application Development;
Tags: Development Practices; Security

Stephanie Chamblee
All about JWT's
Stephanie Chamblee

The design of many user-authentication systems have been impacted by the introduction of JSON Web Token technology. Learn why these tokens have caused a stir in the field of web security and also learn how to avoid two of the most common security attacks associated with their use. In this talk, we'

Room: Regency South B
Topics: Application Development;
Tags: Development Practices; Security; Software Practices; Web

Ondrej Balas
From SMS to OTP to FIDO2 with WebAuthn: This is Modern 2FA
Ondrej Balas

For many years SMS was the industry’s go-to method of implementing two-factor authentication. But in recent years several high profile attacks have occurred in which attackers have taken advantage of flaws in SMS. In this session I will show you why current 2FA implementations using SMS are inadequa

Room: Regency South B
Topics: Application Development;
Tags: .NET; Security; Web

About

A software development conference in the Louisville, KY area on designed to cover all aspects of software development regardless of development stack.

Contact Us
Keep in Touch