Find your conference pictures using the power of the cloud! - By Tim van Eijndhoven en Roy Braam (JPoint).
As regular conference speakers and attendees we appreciate the efforts from organizers to document the conference using photography. The only downside from this is that we often spend a lot of time clicking through many pages of pictures to find the ones which are relevant to us. So we did what all decent programmers do: automate this tedious task. In this talk we will show you how we leveraged the power of the cloud using Quarkus and GraalVM to build AWS lambdas running native images, the AWS CDK to deploy infrastructure using actual code for our infrastructure and AWS Rekognition to do the heavy lifting in image analysis. We will tell you about the cool parts of this tool and its cutting edge technologies, but will also be honest about the bleeding caused by that edge. Hopefully this talk makes it a bit less sharp...
Stranger Danger: Finding Security Vulnerabilities Before They Find You! - by Brian Vermeer (Snyk)
Open source modules are undoubtedly awesome. However, they also represent an undeniable and massive risk. You’re introducing someone else’s code into your system, often with little or no scrutiny. The wrong package can introduce severe vulnerabilities into your application, exposing your application and your user’s data. This talk will use a sample application, Goof, which uses various vulnerable dependencies, which we will exploit as an attacker would. For each issue, we’ll explain why it happened, show its impact, and – most importantly – see how to avoid or fix it. We’ll live hack exploits like the classic struts vulnerability that recently made it famous, along with Spring Break and several others.
Diner: 17:30 - 18:30
Talks with break between them: 18:30 - 21:00
Claim the event and start manage its content.I am the organizer