Neil Roebert

Senior Information Security Consultant F-Secure Consulting

BIOGRAPHY

I started at MWR InfoSecurity, now F-Secure Consulting, straight out of university at the end of 2015, where I studied Computer Engineering. I used this base knowledge to start out as a mobile consultant where I did everything from Mobile application pentesting, breaking IoT devices, and rooting POS devices. During this time, I also completed OSCP and gathered a bit more of a holistic view on the cyber security footprint a company has. This lead me down the avenue of focusing on DevOps and the security surrounding the people processes and technology involved there. In my spare time I do triathlons and walk my dogs.

Securing DevOps: Common misconceptions

DevOps has been a big topic in recent years, however as with any new technology that is found in the market, there are often several common security misconceptions that occur. With most companies fully converted to the agile developmental approach, the need to further enhance the flow has naturally evolved from this. DevOps – the collaboration and almost unification of the developer and the operations teams – has been the resolution to the “speed to market” conundrum that companies are faced with.

However, with new DevOps support infrastructure, which is constantly being introduced, companies can often lose oversight of the unique implementation thereof by their various development teams. This infrastructure is often a cause for concern, where a compromise in any stage of a pipeline, would often lead to a compromise of the application associated to the pipeline.

This talk focuses on the DevOps supporting infrastructure and the importance of gaining a holistic security view thereof. MWR has developed a standardised testing methodology that aims to ease the confusion surrounding the testing of, and approach to a DevOps pipeline from a security focused mindset.

In this talk:

A discussion on newly defined DevOps vulnerabilities

A discussion of real world attacks on a misconfigured pipeline.

A new model that can be used to classify and test a bespoke DevOps environment.

Are you the next cyber security superstar?

If you are passionate about an information security topic or you have strong technical skills developing researches on your own, you should definitely Apply at Call for Papers. By submitting you will have the chance to showcase your work to +2000 attendees.

Other speakers joining this year

Jelena Milosevic

nurse/infosecurity researcher/ speaker/ trainer

SPEAKER INTERVIEW AVAILABLE

Rosalia d’Alessandro

Security Associate Manager Accenture Italia

Mihai Petre

Lead Software Engineer Garrett - Advancing Motion

Ready for this year's presentations?

By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.

0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange „brings you closer to what matters to you”.

This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNER
VIP & SPEAKERS LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS