Loading…
19 September 2024
Learn More and Register to Attend

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for SOSS Community Day Europe 2024 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

Please note: This schedule is automatically displayed in Central Europe Summer Time (CEST). To see the schedule in your preferred timezone, please select from the drop-down located at the bottom of the menu to the right.

The schedule is subject to change.
strong>Room 3.16-3.17 [clear filter]
Thursday, September 19
 

10:15 CEST

We Know Security but How Do We Secure GenAI End-to-End? - Mihai Maruseac, Google
Thursday September 19, 2024 10:15 - 10:35 CEST
AI developers are experts at building AI models. Security people know how to secure traditional software. But how do we secure software that contains AI? This is not a theoretical question: We have executive orders for strengthening the supply chain and secure AI development, we have NIST SP 800-218A for secure usage of GenAI. What is lacking is a deep dive into how people can use OSS technologies to secure software using AI. This is what we are planning to do in this talk. We will present every possible step that can be taken to train models in a secure way. This will cover securing the data from ingestion to using it during training, and evaluation. It also covers fine-tuning foundational models and model quantization. It aims to be the most complete and comprehensive resource in securing AI powered application from the point of view of the software supply chain. Then, it will include items about securing AI outputs, securing AI deployments. This is really important to do, because we see the same security concerns from traditional software being repeated in AI world, but at an accelerated pace. As threat landscape evolves, we are should building on stable, secure foundations.
Speakers
avatar for Mihai Maruseac

Mihai Maruseac

Staff Software Engineer, Google
Mihai Maruseac is a member of Google Open Source Security team (GOSST), working on Supply Chain Security for ML and on GUAC. Before joining GOSST, Mihai created the TensorFlow Security team after joining Google, moving from a startup to incorporate Differential Privacy (DP) withing... Read More →
Thursday September 19, 2024 10:15 - 10:35 CEST
Room 3.16-3.17

10:40 CEST

Nation-State Threats in the Open-Source Software Supply Chain - Ross Bryant, Phylum
Thursday September 19, 2024 10:40 - 11:00 CEST
North Korea (DPRK) has been an active cyber threat since at least 2009. It is estimated that 90% of all DPRK cyber threat activity is attributable to a group under the Korean People's Army known as the Lazarus Group, which was responsible for the 2014 attack against Sony Pictures Entertainment. In June 2023, the Phylum Research Team discovered a series of suspicious packages published in the npm ecosystem. Upon installation, these packages facilitated the download of a malicious payload from a remote server. Later, GitHub published their independent findings, together with Microsoft Threat Intelligence and CISA, and confirmed that these packages were the work of the Lazarus Group. This campaign targeted software developers over three months. A new Lazarus Group campaign began in September 2023 with different and evolving tactics. Dozens of malicious packages were published during this time and were seen as recently as February 2024. The details in the code of these packages differ significantly, but a common motive between these two campaigns remains: stealing cryptocurrency from job-seeking software developers through social engineering.
Speakers
avatar for Ross Bryant

Ross Bryant

Chief of Research, Phylum
Ross is the Chief of Research at Phylum and has over a decade of threat-hunting research experience. Before joining Phylum, he worked as a researcher for the U.S. Department of Energy and as a research mathematician for the U.S. Department of Defense.
Thursday September 19, 2024 10:40 - 11:00 CEST
Room 3.16-3.17

11:20 CEST

Enforcing Organization Policies with Enterprise Contract - Zoran Regvart, Red Hat
Thursday September 19, 2024 11:20 - 11:40 CEST
In today's rapidly evolving tech landscape, ensuring that container images comply with organizational policies is paramount for maintaining security. Join us for an insightful session on leveraging the open-source Enterprise Contract ecosystem to enforce these policies effectively within your organization. In this session, we will delve into how Enterprise Contract utilizes Sigstore signatures, in-toto attestations, and other tamper-proof sources to enforce organization policies. Although Enterprise Contract is a CI agnostic tool, we will focus on the Tekton ecosystem. Key points covered will include: 1. The critical role of ensuring container images meet organizational policies. 2. How Enterprise Contract enforces policies using secure and tamper-proof sources. 3. Configuring policies to validate specific Tekton Tasks, like code scanners, have been executed during the container image build process. This session is designed for attendees already familiar with the Sigstore community project, though true beginners are also encouraged to join. By the end of this session, participants will understand how to go beyond simple signature checks to validate their container images.
Speakers
avatar for Zoran Regvart

Zoran Regvart

Software Engineer, Red Hat
Zoran Regvart is a Software Engineer at Red Hat and Apache Software Foundation member. He has been involved in various open source projects, including Apache Camel, Tekton and Open Policy Agent. More recently, he has worked with his team on building a mechanism to standardize the... Read More →
Thursday September 19, 2024 11:20 - 11:40 CEST
Room 3.16-3.17

11:45 CEST

Play, Learn, Secure: The Power of Gamification in Security Training - Julia Lamenza, Consultant
Thursday September 19, 2024 11:45 - 12:05 CEST
As cybersecurity threats continue to evolve, traditional security training can sometimes feel boring and often misses the mark in keeping people engaged or helping them retain key security concepts. This presentation explores how gamification can transform security training. By incorporating hands-on challenges, real-world scenarios, and instant feedback, gamified learning not only grabs attention but also helps the lessons stick in the long run.
Speakers
avatar for Julia Lamenza

Julia Lamenza

SRE, Consultant
A knowledge-sharing enthusiast diving deeper into the DevOps and SRE worlds every day. Just a woman in infrastructure, making the cloud a bit fluffier. 😉
Thursday September 19, 2024 11:45 - 12:05 CEST
Room 3.16-3.17

12:10 CEST

Breaking Barriers: The Art of (Free) Gamified Security Training - Joseph Katsioloudes, GitHub
Thursday September 19, 2024 12:10 - 12:30 CEST
In a world where security training often feels like a mundane chore, discover the refreshing impact of gamification and turn learning into an enjoyable experience. Embark on an insightful journey as we unveil the success story of gh.io/securecodegame, an open-source game hosted on GitHub Skills, that attracted over 3,000 developers within the first 6 months. This session will provide you with an exclusive behind-the-scenes perspective, offering valuable insights and practical strategies to revolutionize various aspects of security training for your benefit. We’ll explore a case study from a tech startup that observed, among the developers who played the game, an increased sense of ownership for code security, improved communication with security teams, and a strong willingness to embrace further security training.
Speakers
avatar for Joseph Katsioloudes

Joseph Katsioloudes

Developer Advocate, GitHub
Joseph is a security expert who empowers developers to ship secure software through his research and education work at the GitHub Security Lab. His recent contributions include video content with combined 1M+ views packed with practical security tips, and the free game gh.io/securecodegame... Read More →
Thursday September 19, 2024 12:10 - 12:30 CEST
Room 3.16-3.17

12:35 CEST

Rules of Engagement for Forking a Dependency - Chris Swan, Atsign
Thursday September 19, 2024 12:35 - 12:45 CEST
You got the CVE notification, but there's no fix yet. Customers GUACing your SBOMs are worried. Should you fork? This presentation will run through the rules of engagement we've used at Atsign when these situations arise, which aim to balance good community citizenship with making sure stuff gets fixed.
Speakers
avatar for Chris Swan

Chris Swan

Engineer, Atsign
Chris Swan is an Engineer at Atsign, building the atPlatform, a technology that is putting people in control of their data and removing the frictions and surveillance associated with today’s Internet. He was previously a Fellow at DXC Technology where he held various CTO roles... Read More →
Thursday September 19, 2024 12:35 - 12:45 CEST
Room 3.16-3.17

14:15 CEST

Prioritisation of SCA Findings in Software Dependencies Using Static Reachability Analysis - Joseph Hejderup, Endor Labs
Thursday September 19, 2024 14:15 - 14:35 CEST
A new day brings a new CVE alert for a third-party library, prompting urgent questions: Are we using this library? How many projects are affected? What’s our quick remediation plan? Traditional tools that analyze build manifests often fail to provide timely insights into these security vulnerabilities because they overlook actual code usage. In this talk, we'll demonstrate how static and reachability analyses offer a more effective approach by examining real dependency usage, enhancing prioritization and understanding of necessary updates for vulnerable libraries. Using real-world examples, we'll show how these analyses help developers better prioritize updates and understand dependency changes, aiding in informed decision-making. Our goal is to provide strategies for using these analyses to manage dependencies more effectively, uncover vulnerabilities, and enhance security and productivity in software development workflows.
Speakers
avatar for Joseph Hejderup

Joseph Hejderup

Member of Technical Staff, Endor Labs
Joseph Hejderup, a part-time developer and PhD student, is also a full-time enthusiast in enhancing package management systems. At Endor Labs and Delft University of Technology, he applies program analysis to improve the use of third-party components and assess their security and... Read More →
Thursday September 19, 2024 14:15 - 14:35 CEST
Room 3.16-3.17

14:40 CEST

Managing Vulnerabilities in Open-Source Dependencies - Eva Sarafianou, Mattermost
Thursday September 19, 2024 14:40 - 15:00 CEST
In today’s software development landscape, products are often an intricate blend of in-house code and open-source third-party dependencies. While many organizations have robust procedures to secure their own codebase, the strategies to safeguard against vulnerabilities in open-source components are not as well-developed. In this session, we will navigate the complexities of implementing an effective process to manage vulnerabilities within open-source dependencies. Our discussion will cover key considerations for evaluating software composition analysis tools and detail the steps necessary for a successful tool rollout. We will delve into effective strategies for triaging findings and shifting from a reactive to a proactive security posture. You will leave the session equipped with a foundational but adaptable process, ready to enhance the security of your products that depend on open-source dependencies.
Speakers
avatar for Eva Sarafianou

Eva Sarafianou

Product Security Engineering Lead, Mattermost
Eva is the Product Security Engineering Lead at Mattermost overseeing the Product Security function. Previously she was a Principal Product Security Engineer at Auth0/Okta. Passionate about creating secure applications, Eva is dedicated to building a robust product security program... Read More →
Thursday September 19, 2024 14:40 - 15:00 CEST
Room 3.16-3.17

15:05 CEST

Secure Coding Guide for Python - David Mather & Bart Karas, Ericsson
Thursday September 19, 2024 15:05 - 15:15 CEST
Python is an incredibly popular programming language and the language of choice for countless open source projects, ranging from hobbyist projects, via entire cloud virtualization frameworks (e.g. OpenStack), to being a key enabler for a large portion of AI and ML tooling (e.g. PyTorch). Helping these Python developers to securely master their programming challenges has a concrete benefit to the security of this vibrant open source ecosystem. The OpenSSF Best Practices Working Group has recently adopted a new initiative which aims to create a Secure Coding Guide for Python. Structured around Mitre's CWE framework, the guide provides tangible advice for a wide range of programming challenges, including executable code examples. These code snippets aim to allow developers to build a better understanding by enabling experimentation with concrete implementations while also constituting a proving ground for tool-based detection of weaknesses and vulnerabilities. In this brief presentation, Georg and Helge will provide an overview of the guide, its current state and its roadmap. We explicitly aim to solicit feedback from the Python community to further improve the guide.
Speakers
avatar for David Mather

David Mather

Engineer, Ericsson
David Mather is a Software Engineer and Lead Product Owner at Ericsson, where they specialize in designing and developing cutting-edge telecommunications software solutions. He has a master’s degree in cybersecurity, a bachelor’s degree in computer science and several years of... Read More →
avatar for Bartlomiej Karas

Bartlomiej Karas

Software Engineer, Ericsson
Bartlomiej Karas is a Software Engineer based in Ericsson, Athlone in Ireland where he works on the Ericsson Network Manager on Cloud deployments. During his time at Ericsson, Bart has gained knowledge of a wide variety of concepts and technologies including Kubernetes, microservices... Read More →
Thursday September 19, 2024 15:05 - 15:15 CEST
Room 3.16-3.17

15:20 CEST

Exploring Some Essential Security Checks for Any Open Source Go Project - Cosmin Cojocar, Google
Thursday September 19, 2024 15:20 - 15:40 CEST
Code security analysis, dependencies vulnerability scanning and supply chain security should be part of any open source Go project. In this talk, we will explore some open source tools such as gosec, govulncheck and sigstore/cosign which make it easy for any maintainer to enhance the security of her project. We will show real examples from gosec project where these tools are used to keep the security of the project at bay when constantly releasing new versions.
Speakers
avatar for Cosmin Cojocar

Cosmin Cojocar

Senior Security Engineer, Google
Cosmin is a Senior Security Engineer at Google working on cloud security, before that he was with Adobe and Microsoft Azure. He is involved in open source software for almost two decades as a contributor and maintainer of several projects such as gosec (a static security analyser... Read More →
Thursday September 19, 2024 15:20 - 15:40 CEST
Room 3.16-3.17

16:00 CEST

TTX Session - Daniel Appelquist, Samsung; Kairo De Araujo, TestifySec; Georg Kunz, Ericsson; & Moderated by Katherine Druckman, Intel Corporation
Thursday September 19, 2024 16:00 - 17:15 CEST

In light of the upcoming new EU software regulations, OpenSSF will host a 90-minute interactive session to simulate a security incident response to achieve a few goals:
  • Provide a playbook for maintainers, contributors, and open source consumers to adopt and customize to start running their own TTX and improve their incident response and overall security posture.
  • Provide education for developers who are learning security
  • Demonstrate how current OpenSSF technologies may be helpful during a security incident
Session attendees will actively engage in the exercise by bringing their expertise in open software security ranging from open source production, distribution, consumption, vulnerability disclosure and management to incident response.
Note: This session will not be recorded
Speakers
avatar for Katherine Druckman

Katherine Druckman

Open Source Evangelist, Intel
Katherine Druckman is an Open Source Evangelist at Intel where she enjoys sharing her passion for a variety of open source topics. She is a long-time open source advocate, developer, and podcaster, and is currently the host of Open at Intel and co-host of the FLOSS Weekly and Reality... Read More →
avatar for Georg Kunz

Georg Kunz

Open Source Program Manager, Ericsson
Georg is an Open Source advocate and a long-term contributor to a wide range of open source communities and projects in LF Networking and beyond, such as OpenStack, OPNFV/Anuket, and OpenSSF. He served for multiple terms on the Anuket Technical Steering Committee and currently serves... Read More →
avatar for Daniel Appelquist

Daniel Appelquist

Open Source Strategist, Samsung
Dan Appelquist is Open Source Strategist at Samsung Open Source Group. He is a web & mobile industry veteran and long-time participant and leader in open source and open standards. He has been co-chair of the W3C Technical Architecture Group for the last ten years. He was an early... Read More →
avatar for Kairo De Araujo

Kairo De Araujo

Senior Software Engineer - Open Source, TestifySec
Kairo is a Senior Open Source Engineer at TestifySec. Kairo contributed to python-tuf and is the author of Repository Service for TUF (RSTUF). Past roles include Senior Open Source Software Engineer at VMware OSPO, Senior Software Engineer at IBM, ING, Forescout, and a former System... Read More →
Thursday September 19, 2024 16:00 - 17:15 CEST
Room 3.16-3.17
 
  • Filter By Venue
  • Filter By Type
  • Session Slides Attached
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.