Brussels / 4 & 5 February 2023

schedule

UA2.118 (Henriot)


Day Start End Track(s)
Saturday 10:30 18:55 Security
Sunday 09:00 16:50 PostgreSQL
09 10 11 12 13 14 15 16 17 18
Saturday Enabling FIDO2/WebAuthn support for remotely managed users FIDO beyond the browser AMENDMENT Hardening Linux System with File Access Policy Daemon Elliptic curves in FOSS
More curves to the set
OpenSSL in RHEL: FIPS-140-3 certification
From FIPS-140-2 upstream to FIPS-140-3 downstream
Kerberos PKINIT: what, why, and how (to break it) Remote Attestation with Keylime AMENDMENT Hybrid Public Key Encryption in PQ world?
Converting HPKE to be PQ
Where does that code come from?
Git Checkout Authentication to the Rescue of Supply Chain Security
Whom Do You Trust?
Privacy and Collaboration in CryptPad
IntelOwl Project
making the life of security analysts easier
What Does Rugby Have To Do With Sigstore?
Learning Sigstore via Rugby
How to protect your Kubernetes cluster using Crowdsec Secure voice/video over IP communications today and tomorrow thanks to post-quantum encryption !
The Linphone softphone has integrated CRYSTALS-Kyber, the NIST finalist algorithm in the encryption key category
Mercator
Mapping the information system
Hardware-backed attestation in TLS Demystifying StackRox
Unlock zero trust cloud-native security in Kubernetes
Sunday Tour de Data Types: VARCHAR2 or CHAR(255)? How to Give Your Postgres Blog Posts an Outsize Impact When it all GOes right AMENDMENT The Human Factor: Why Database teams Need Crew Resource Management Bulk Inserts With PostgreSQL: Four Methods For Efficient Data Loading DBA Evolution (the Changing Role of the Database Administrator) Deep Dive Into Query Performance Don't Do This

Events

Title Track Start End

Saturday

  Enabling FIDO2/WebAuthn support for remotely managed users Security 10:30 10:55
  FIDO beyond the browser Security 11:00 11:25
  AMENDMENT Hardening Linux System with File Access Policy Daemon Security 11:30 11:55
  Elliptic curves in FOSS
More curves to the set
Security 12:00 12:25
  OpenSSL in RHEL: FIPS-140-3 certification
From FIPS-140-2 upstream to FIPS-140-3 downstream
Security 12:30 12:55
  Kerberos PKINIT: what, why, and how (to break it) Security 13:00 13:25
  Remote Attestation with Keylime Security 13:30 13:55
  AMENDMENT Hybrid Public Key Encryption in PQ world?
Converting HPKE to be PQ
Security 14:00 14:25
  Where does that code come from?
Git Checkout Authentication to the Rescue of Supply Chain Security
Security 14:30 14:55
  Whom Do You Trust?
Privacy and Collaboration in CryptPad
Security 15:00 15:25
  IntelOwl Project
making the life of security analysts easier
Security 15:30 15:55
  What Does Rugby Have To Do With Sigstore?
Learning Sigstore via Rugby
Security 16:00 16:25
  How to protect your Kubernetes cluster using Crowdsec Security 16:30 16:55
  Secure voice/video over IP communications today and tomorrow thanks to post-quantum encryption !
The Linphone softphone has integrated CRYSTALS-Kyber, the NIST finalist algorithm in the encryption key category
Security 17:00 17:25
  Mercator
Mapping the information system
Security 17:30 17:55
  Hardware-backed attestation in TLS Security 18:00 18:25
  Demystifying StackRox
Unlock zero trust cloud-native security in Kubernetes
Security 18:30 18:55

Sunday

  Tour de Data Types: VARCHAR2 or CHAR(255)? PostgreSQL 09:00 09:50
  How to Give Your Postgres Blog Posts an Outsize Impact PostgreSQL 10:00 10:50
  When it all GOes right PostgreSQL 11:00 11:50
  AMENDMENT The Human Factor: Why Database teams Need Crew Resource Management PostgreSQL 12:00 12:50
  Bulk Inserts With PostgreSQL: Four Methods For Efficient Data Loading PostgreSQL 13:00 13:50
  DBA Evolution (the Changing Role of the Database Administrator) PostgreSQL 14:00 14:50
  Deep Dive Into Query Performance PostgreSQL 15:00 15:50
  Don't Do This PostgreSQL 16:00 16:50