19-08-2018 19:36:55

Driving IT giver den 2. november 2018 et unikt indblik i it-verdenens konstante ændringer. og du kommer hjem med konkret og brugbar viden om IT og udvikling. Tilmeld dig nu.

Webinarer 2017

Her finder du alle webinarerne fra Driving IT 2017.
13. nov. 2017 Af: Driving IT
Attacking with HTTP requests ved Hanno Böck
Attacking with HTTP requests ved Hanno Böck

Simply trying to download files from webpages leads to a surprisingly devastating attack vector that causes database leaks, exposed private keys and much more. Eventually this also led to the disc ...

Se video
CHERI: A Hybrid Capability Architecture ved Robert Watson, Cambridge University
CHERI: A Hybrid Capability Architecture ved Robert Watson, Cambridge University

Over the last 8 years, a research team spanning SRI International and the University of Cambridge have worked to develop the security-oriented CHERI computer architecture, which naturally mitigate ...

Se video
Delightful Data Explotation ved Keld Norman, Dubex
Delightful Data Explotation ved Keld Norman, Dubex

Læg dagligdagen fra dig et øjeblik og tag med ind i de it-kriminelles verden i selskab med Danmarks mest underholdende it-sikkerhedsnørd. Keld Norman viser dig, hvor let det er at være hacker i vo ...

Se video
Hackere styrker din organisations immunforsvar ved Lone J. Dransfeldt Christensen, NNIT
Hackere styrker din organisations immunforsvar ved Lone J. Dransfeldt Christensen, NNIT

Fremfor at frygte hackere, kan virksomhederne med fordel invitere hackerne indenfor, da deres evner til at omgå og overvinde begrænsninger tvinger virksomheden til at bygge bedre, mere stabile og ...

Se video
Jeg betaler penge for dine personlige data ved Mogens Nørgaard CIMA
Jeg betaler penge for dine personlige data ved Mogens Nørgaard CIMA

De fire mest værdifulde firmaer i verden lever af dine data. Lær, hvordan du kan få penge for dem.

Se video
Lessons of the internet and computing for a future exponential world ved Brad Templeton, Singularity University
Lessons of the internet and computing for a future exponential world ved Brad Templeton, Singularity University

The internet and computer industries have lived with exponential change for many decades, and they have lessons to teach everything else about how it's done -- and even lessons to learn within the ...

Se video
Next Generation Config Mgmt: Reactive Systems ved James Shubin, Purpleidea (Keynote)
Next Generation Config Mgmt: Reactive Systems ved James Shubin, Purpleidea (Keynote)

Mgmt is a next gen config management tool that takes a fresh look at existing automation problems. Three of the main design features of the tool include: * Parallel execution * Event driven m ...

Se video
Not your grandmother’s IT ved Geoff Halprin
Not your grandmother’s IT ved Geoff Halprin

Cloud, APIs, Microservices - The way IT has been done for the past 40 year is no longer sustainable. We will discuss why, and examine DevOps and other industry trends and how they require a radica ...

Se video
Ohhhh...shit! ved Poul-Henning Kamp
Ohhhh...shit! ved Poul-Henning Kamp

Why didn't you notice Varnish Cache's major security incident?

Se video
Smart contracts are neither smart nor contracts ved Fritz Henglein, DIKU
Smart contracts are neither smart nor contracts ved Fritz Henglein, DIKU

Smart contracts are programs written in a Java-like language run on one of the dominant blockchain/distributed ledger systems. We discuss why this makes them neither contracts nor is it necessari ...

Se video
Status på persondataforordningen ved Henning Mortensen, Rådet for digital sikkerhed
Status på persondataforordningen ved Henning Mortensen, Rådet for digital sikkerhed

Om et halvt år gælder EU's persondataforordning. Mange danske virksomheder er i gang med at implementer den. Hvordan går det? Hvor er faldgruberne? Hvor mangler vi fortsat en afklaring? Kom og ...

Se video
The state of email encryption ved Anders Berggren, CTO Halon
The state of email encryption ved Anders Berggren, CTO Halon

Email remains the go-to form of communication in the business world, yet we don't have working transport encryption like we do for the web. With DANE and MTA-STS around the corner, email encryptio ...

Se video
WannaCry – Global Ransomware attack overview ved Irena Damsky, ThreatSTOP
WannaCry – Global Ransomware attack overview ved Irena Damsky, ThreatSTOP

WannaCry has been an internet wide event causing thousands of infections worldwide in May 2017 - What happened? How did it happen? Who is behind it and why? Who got affected, and did they manage t ...

Se video
What is Cyber War, and how does it affect Denmark? ved Kenneth Geers, Nato Cyber center - via skype
What is Cyber War, and how does it affect Denmark? ved Kenneth Geers, Nato Cyber center - via skype

This talk discusses the connection between network security and national security, and the rise of cyberspace as a domain of international conflict.

Se video
Why don't danish websites treat visitors well ved Pritt Potter, Plumbr
Why don't danish websites treat visitors well ved Pritt Potter, Plumbr

This September, Plumbr built a team of robots that visited hundreds of Danish high volume web sites and found that many of them are too slow or even technically broken for some visitors. In his ta ...

Se video
XDP (eXpress Data Path) in the Linux kernel ved Jesper Brouer, Redhat (Keynote)
XDP (eXpress Data Path) in the Linux kernel ved Jesper Brouer, Redhat (Keynote)

Linux kernel networking have gotten a new eXpress Data Path (XDP), which is an earlier packet processing stage. It operates at the same speed as competing Kernel-bypass solutions. This talk gives ...

Se video
luk
close