
Aaron Bedra
CTO / Chief Scientist
Jemurai
location_on United States
Member since 3 years
Aaron Bedra
Specialises In (based on submitted proposals)
Aaron Bedra is the CTO and Chief Scientist at Jemurai, where he works at the intersection of software, security, and business. He has served as a Chief Security Officer, Chief Technology Officer, and Principal Engineer/Architect. He has worked professionally on programming languages, most notably Clojure and ClojureScript. Aaron is the creator of Repsheet, an open source threat intelligence toolkit. He is the co-author of Programming Clojure, 2nd and 3rd Edition and a contributor to Functional Programming: A PragPub Anthology.
-
keyboard_arrow_down
Adaptive Security
60 Mins
Talk
Advanced
As humans we process information as it is presented to us. We use the information presented to us to decide on how to react and possibly adapt to the current situation. This trait has a lot of advantages and has served us well over many years. Our approach to the security of our systems should be much the same. Join Aaron as he introduces patterns for processing potentially malicious activity and weaving an adaptive security system.
-
keyboard_arrow_down
Adaptive Security
60 Mins
Talk
Advanced
As humans we process information as it is presented to us. We use the information presented to us to decide on how to react and possibly adapt to the current situation. This trait has a lot of advantages and has served us well over many years. Our approach to the security of our systems should be much the same. Join Aaron as he introduces patterns for processing potentially malicious activity and weaving an adaptive security system.
-
keyboard_arrow_down
Adaptive Security
60 Mins
Talk
Advanced
As humans we process information as it is presented to us. We use the information presented to us to decide on how to react and possibly adapt to the current situation. This trait has a lot of advantages and has served us well over many years. Our approach to the security of our systems should be much the same. Join Aaron as he introduces patterns for processing potentially malicious activity and weaving an adaptive security system.
-
keyboard_arrow_down
Ready Set Clojure!
50 Mins
Talk
Advanced
With Clojure on the rise it is time you learned how to properly wield your parens. Join Aaron as he walks you through building software with Clojure. You will walk through a real world example; building a library for working with Redis. Building beautiful abstractions on top of data has always been the lisp way, and this example will be no different. You will walk away with a better understanding of Clojure, interfacing with external services, and gain situational knowledge of when and how to use Clojure’s macros to help you produce more powerful abstractions.
-
keyboard_arrow_down
Ready Set Clojure!
50 Mins
Talk
Advanced
With Clojure on the rise it is time you learned how to properly wield your parens. Join Aaron as he walks you through building software with Clojure. You will walk through a real world example; building a library for working with Redis. Building beautiful abstractions on top of data has always been the lisp way, and this example will be no different. You will walk away with a better understanding of Clojure, interfacing with external services, and gain situational knowledge of when and how to use Clojure’s macros to help you produce more powerful abstractions.
-
keyboard_arrow_down
Repsheet: A Behavior Based Approach to Web Application Security
50 Mins
Talk
Advanced
The world of information security is changing in dramatic ways. In order to keep up with the demands of users and drive innovation, we have to start taking new approaches to securing our web applications. This means enabling increased security while decreasing friction for known good users. In order to make this happen it requires dynamic security controls. It means deriving intent through behavior. This approach not only makes for a more enjoyable experience for good users, it helps spot attacks in progress and trend developing threats such as botnets and DDoS attacks.
Join Aaron Bedra as he walks you through asking the questions you should be asking of your users activity, and how to help prevent abuse, fraud, and otherwise unwanted activity on your web applications while decreasing friction for good users. You will learn how to ask the right questions without interfering with a great user experience.
-
keyboard_arrow_down
Repsheet: A Behavior Based Approach to Web Application Security
50 Mins
Talk
Advanced
The world of information security is changing in dramatic ways. In order to keep up with the demands of users and drive innovation, we have to start taking new approaches to securing our web applications. This means enabling increased security while decreasing friction for known good users. In order to make this happen it requires dynamic security controls. It means deriving intent through behavior. This approach not only makes for a more enjoyable experience for good users, it helps spot attacks in progress and trend developing threats such as botnets and DDoS attacks.
Join Aaron Bedra as he walks you through asking the questions you should be asking of your users activity, and how to help prevent abuse, fraud, and otherwise unwanted activity on your web applications while decreasing friction for good users. You will learn how to ask the right questions without interfering with a great user experience.
-
keyboard_arrow_down
Repsheet: A Behavior Based Approach to Web Application Security
50 Mins
Talk
Advanced
The world of information security is changing in dramatic ways. In order to keep up with the demands of users and drive innovation, we have to start taking new approaches to securing our web applications. This means enabling increased security while decreasing friction for known good users. In order to make this happen it requires dynamic security controls. It means deriving intent through behavior. This approach not only makes for a more enjoyable experience for good users, it helps spot attacks in progress and trend developing threats such as botnets and DDoS attacks.
Join Aaron Bedra as he walks you through asking the questions you should be asking of your users activity, and how to help prevent abuse, fraud, and otherwise unwanted activity on your web applications while decreasing friction for good users. You will learn how to ask the right questions without interfering with a great user experience.
-
keyboard_arrow_down
Ready Set Clojure!
50 Mins
Talk
Advanced
With Clojure on the rise it is time you learned how to properly wield your parens. Join Aaron as he walks you through building software with Clojure. You will walk through a real world example; building a library for working with Redis. Building beautiful abstractions on top of data has always been the lisp way, and this example will be no different. You will walk away with a better understanding of Clojure, interfacing with external services, and gain situational knowledge of when and how to use Clojure’s macros to help you produce more powerful abstractions.
-
keyboard_arrow_down
Security and the CTO
30 Mins
Talk
Intermediate
Aaron Bedra will talk on some of the security issues that all CTOs need to be aware of.
-
keyboard_arrow_down
Security and the CTO
30 Mins
Talk
Intermediate
Aaron Bedra will talk on some of the security issues that all CTOs need to be aware of.
-
keyboard_arrow_down
AWS Security Essentials Workshop
480 Mins
Workshop
Advanced
Are you using or moving to AWS? Have you considered how you organize and secure your AWS environments? The growing push to cloud providers has allowed us to move faster and tackle problems more efficiently. The same freedoms that have allowed us to move faster have also created scenarios where security issues are exposed by accident and/or without proper management and review. As companies move toward more and more cloud usage, teams are pushed harder to ensure the same compliance and security requirements that exist in slower moving private environments. This has the potential to put us right back where we came from.
Join Aaron in this in-depth workshop and work through the most critical security decisions you can make for your AWS environments. Identify issues and solutions in an automation friendly fashion that aim to fit seamlessly into the development and deployment lifecycle.
-
keyboard_arrow_down
AWS Security Essentials Workshop
480 Mins
Workshop
Advanced
Are you using or moving to AWS? Have you considered how you organize and secure your AWS environments? The growing push to cloud providers has allowed us to move faster and tackle problems more efficiently. The same freedoms that have allowed us to move faster have also created scenarios where security issues are exposed by accident and/or without proper management and review. As companies move toward more and more cloud usage, teams are pushed harder to ensure the same compliance and security requirements that exist in slower moving private environments. This has the potential to put us right back where we came from.
Join Aaron in this in-depth workshop and work through the most critical security decisions you can make for your AWS environments. Identify issues and solutions in an automation friendly fashion that aim to fit seamlessly into the development and deployment lifecycle.
-
keyboard_arrow_down
AWS Security Essentials
50 Mins
Talk
Advanced
Are you using or moving to AWS? Have you considered how you organize and secure your AWS environments? The growing push to cloud providers has allowed us to move faster and tackle problems more efficiently. The same freedoms that have allowed us to move faster have also created scenarios where security issues are exposed by accident and/or without proper management and review. As companies move toward more and more cloud usage, teams are pushed harder to ensure the same compliance and security requirements that exist in slower moving private environments. This has the potential to put us right back where we came from.
Join Aaron as he talks through the most critical security decisions you can make for you AWS environments.
-
keyboard_arrow_down
AWS Security Essentials
50 Mins
talk
Advanced
Are you using or moving to AWS? Have you considered how you organize and secure your AWS environments? The growing push to cloud providers has allowed us to move faster and tackle problems more efficiently. The same freedoms that have allowed us to move faster have also created scenarios where security issues are exposed by accident and/or without proper management and review. As companies move toward more and more cloud usage, teams are pushed harder to ensure the same compliance and security requirements that exist in slower moving private environments. This has the potential to put us right back where we came from.
Join Aaron as he talks through the most critical security decisions you can make for you AWS environments.
-
keyboard_arrow_down
AWS Security Essentials
50 Mins
Talk
Advanced
Are you using or moving to AWS? Have you considered how you organize and secure your AWS environments? The growing push to cloud providers has allowed us to move faster and tackle problems more efficiently. The same freedoms that have allowed us to move faster have also created scenarios where security issues are exposed by accident and/or without proper management and review. As companies move toward more and more cloud usage, teams are pushed harder to ensure the same compliance and security requirements that exist in slower moving private environments. This has the potential to put us right back where we came from.
Join Aaron as he talks through the most critical security decisions you can make for you AWS environments.
-
No more submissions exist.
-
No more submissions exist.