TechWeek site
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

97 lines
4.1 KiB

  1. {
  2. "title": "Home",
  3. "template": "schedule",
  4. "location": "Dublin City University",
  5. "start": 15,
  6. "end": 29,
  7. "month": "March",
  8. "year": 2017,
  9. "live": "2017-03-22T15:00:00",
  10. "archive": "false",
  11. "video": "https://www.youtube.com/embed/videoseries?list=PLPaLJSHTDMFhqzNc5C8UPJTQSKnKrjVP-",
  12. "days": [
  13. {
  14. "day": "Wednesday-15th",
  15. "description": "Security",
  16. "events": [
  17. {
  18. "name": "Opening Event",
  19. "by": "Redbrick DCU's Computer Networking Society",
  20. "time": "15:00",
  21. "place": {
  22. "id": "LG26",
  23. "map": "Somewhere in DCU"
  24. },
  25. "description": "Opening of TechWeek 2017"
  26. },
  27. {
  28. "name": "BeyondCorp: A New Approach to Enterprise Security",
  29. "by": "Donal Hunt - Site Reliability Engineering Manager in Google Ireland",
  30. "time": "15:05",
  31. "place": {
  32. "id": "LG26",
  33. "map": "Somewhere in DCU"
  34. },
  35. "description": "Virtually every company today uses firewalls to enforce perimeter security. However, this security model is problematic because, when that perimeter is breached, an attacker has relatively easy access to a company's privileged intranet. As companies adopt mobile and cloud technologies, the perimeter is becoming increasingly difficult to enforce. Google is taking a different approach to network security. We are removing the requirement for a privileged intranet and moving our corporate applications to the Internet."
  36. },
  37. {
  38. "name": "The curious case of an Iranian actor or maybe two...",
  39. "by": "Alan Neville",
  40. "time": "16:00",
  41. "place": {
  42. "id": "LG26",
  43. "map": "Somewhere in DCU"
  44. },
  45. "description": "In late 2015, Symantec began investigating a suspicious piece of malware detected within a customers environment. Alan, a Senior Threat Intelligence Analyst takes you throguh the full investigation process, starting from a simple detection event to building out the bigger picture. The curious case of an Iranian actor or maybe two..."
  46. },
  47. {
  48. "name": "IOT security",
  49. "by": "d_fens",
  50. "time": "17:00",
  51. "place": {
  52. "id": "LG26",
  53. "map": "Somewhere in DCU"
  54. },
  55. "description": "How IOT security has been developing over the last few years (it hasn't) and what flaws are typically seen in these devices"
  56. },
  57. {
  58. "name": "Offensive Security",
  59. "by": "Ciaran McNally",
  60. "time": "17:30",
  61. "place": {
  62. "id": "LG26",
  63. "map": "Somewhere in DCU"
  64. },
  65. "description": "In a server far far away, some blackhat alliance is enumerating your services in preparation for an attack. They are plnning the fall of your companies empire. We will discuss the open source intelligence techniques such enemies use to identify weaknesses in your armour and examine the processes involved in their penetratoon testing methodology"
  66. }
  67. ]
  68. },
  69. {
  70. "day": "Wednesday-22nd",
  71. "description": "Dev Tools",
  72. "events": [
  73. {
  74. "name": "Getting your code into production and keeping it there.",
  75. "by": "Conor - Circle CI",
  76. "time": "15:00",
  77. "place": {
  78. "id": "LG26",
  79. "map": "Somewhere in DCU"
  80. },
  81. "description": " Writing code is only the start of the process. Getting it into production and keeping it up and running requires a lot of tooling and techniques. I'm going to give a quick tour through some of the things you need to do to turn software into a running product."
  82. },
  83. {
  84. "name": "Docker: A Better Way for Dependencies",
  85. "by": "Cian Butler",
  86. "time": "16:00",
  87. "place": {
  88. "id": "LG26",
  89. "map": "Somewhere in DCU"
  90. },
  91. "description": "What is Docker and why you should care. How does docker help you as a developer and how can it be used to speed up development and make your program more reliable "
  92. }
  93. ]
  94. }
  95. ]
  96. }