Brian Epstein, Institute for Advanced Study
This talk reviews the history of Cryptography leading up to the necessity of Post-Quantum Cryptography. It reviews where we are and what we need to do going forward as practitioners. It will also review a more immediate, but somewhat mundane, risk associated with certificate automation. Certificate lifetimes are being reduced, which requires us to deploy them more frequently. Certificate automation is the only way forward, but it requires significant effort and ongoing auditing for our teams.
Register for Session
Vishal Singh Bhardvaj, OmniSOC
Why this matters now: Rapid adoption of Docker/Kubernetes is accelerating digital transformation, but it also expands attack surface and raises the stakes for securing container environments.
Key container security challenges: Containers introduce distinct risks such as vulnerable images, runtime threats, misconfigurations, weak access controls, and complex network segmentation.
What attendees will learn: Container security fundamentals and best practices (e.g., image scanning, lifecycle security, segmentation) plus practical approaches to deploying honeypots across containers, VMs, and edge devices (e.g., Raspberry Pi).
Real-world value: Case studies and deployment lessons—including common attack patterns—and how honeypot telemetry can directly inform security policies and incident response.
Integrated defense strategy: Methods for combining honeypots with container security controls to build adaptive, proactive defenses in cloud-native/hybrid environments.
Demo & impact: Live demonstrations (including a simulated container escape) to show consequences of weak security and reinforce practical mitigation steps.
Register for Session
Open Spaces give attendees the opportunity to talk about anything they’d like in small break out groups. You might suggest a topic you want to learn about, or one you feel like you can help others with.
Register for Session