Tuesday Jun 19
09:30 –
10:20
Effectenbeurszaal
The Evolution of Threat Models for Secure Communication Products
This video is also available in the GOTO Play video app! Download it to enjoy offline access to our conference videos while on the move.
What happens when a company has to include itself in its threat model? Phil will speak about designing end-to-end secure protocols that are designed to defend against even the secure product vendor and/or the service provider. He will also talk about the recent Efail vulnerabilities that affected S/MIME and PGP mail clients, and how threat models have evolved since PGP was first developed.
Keynotes
-
The Evolution of Threat Models for Secure Communication ProductsPhil ZimmermannTuesday Jun 19 @ 09:30
-
Where Does the Real World End - The Blurring of the Physical and DigitalRebecca ParsonsTuesday Jun 19 @ 17:30
-
Democratizing Distributed Systems: Kubernetes, Brigade, Metaparticle and BeyondBrendan BurnsWednesday Jun 20 @ 09:30
-
Space ShuttleStephen CarverWednesday Jun 20 @ 17:20