03-29, 11:10–12:10 (Europe/Ljubljana), P1
Containers have revolutionized software deployment, but with great convenience come new security risks.
In this session, we'll explore how containers work under the hood, common security pitfalls, and best practices for building and running secure containerized applications. We'll also demonstrate real-world container breakouts and discuss how attackers can exploit misconfigurations
A security engineer at 3fs and a self-taught developer who loves breaking things just to figure out how to secure them again.
I've also been a part of Locked Shields, the biggest live-fire cyber defense exercise.
When I’m not staring into my monitor, I’m busy being a proud parent (which comes with its own set of security challenges).