row |
columns |
|
|
column |
textfield |
size |
center |
|
text |
Inschrijving, ontvangst, koffie |
|
3 |
true |
|
|
|
row |
columns |
|
|
column |
textfield |
center |
size |
|
|
true |
3 |
|
|
|
row |
columns |
|
|
column |
talk |
center |
size |
|
speaker |
title |
keynote |
link |
Lucinda Sterk |
Talk nerdy to me |
true |
|
|
true |
3 |
|
|
|
row |
columns |
|
|
column |
textfield |
center |
size |
|
|
true |
3 |
|
|
|
row |
columns |
|
|
column |
talk |
|
speaker |
title |
link |
Riccardo ten Cate en Glenn ten Cate |
Exploitation, automation, mitigation |
|
|
|
column |
talk |
|
speaker |
title |
Mike Ciavarella |
This is just temporary |
|
|
column |
talk |
|
speaker |
title |
Melchior Aelmans |
Exploring quantum Technology for Networking |
|
|
|
|
|
row |
columns |
|
|
column |
talk |
|
speaker |
title |
Rob Hulsebos |
OT Cybersecurity Challenges |
|
|
column |
talk |
|
speaker |
title |
Michiel Leenaars |
NLnet and NGI Zero: working for the internet |
|
|
column |
talk |
|
speaker |
title |
Sake Blok |
LOG4SHELL: Getting to know your adversary |
|
|
|
|
row |
columns |
|
|
column |
textfield |
center |
size |
|
|
true |
3 |
|
|
|
row |
columns |
|
|
column |
talk |
|
speaker |
title |
Francisco Dominguez and Zawadi Done |
Automating incindent response should be the default |
|
|
column |
talk |
|
speaker |
title |
Andreas Hülsing |
An update on NIST's PQC standardization process |
|
|
column |
talk |
|
speaker |
title |
Kris Buytaert |
Help My Datacenter is On Fire |
|
|
|
|
|
row |
columns |
|
|
column |
talk |
|
speaker |
title |
Jean-Paul Sablerolle |
Power to the Open Source |
|
|
column |
talk |
|
speaker |
title |
Filip Chyla |
Cloud-Native Security with the OWASP Cloud-Native Application Security Top 10 |
|
|
column |
talk |
|
speaker |
title |
Toshaan Bharvani |
Why Open Technologies need to use Open Technologies |
|
|
|
|
row |
columns |
|
|
column |
textfield |
center |
size |
|
|
true |
3 |
|
|
|
row |
columns |
|
|
column |
talk |
|
speaker |
title |
Marcel van der Velde |
Heuristic Park (why we can fake it until we make it) |
|
|
column |
talk |
|
speaker |
title |
link |
Ondřej Caletka |
Run your own networking lab with Vagrant and Ansible |
|
|
|
column |
talk |
|
speaker |
title |
Joost van Dijk |
From passwords to passkeys: What's new with FIDO |
|
|
|
|
|
row |
columns |
|
|
|
column |
talk |
|
speaker |
title |
link |
Marcel Kornegoor |
Course as Code: the future of AT Computing's training courses |
|
|
|
column |
talk |
|
speaker |
title |
Joyce Mellens |
Caer: An IoT Firewall for consumers |
|
|
|
|
row |
columns |
|
|
column |
textfield |
center |
size |
|
text |
text |
Borrel, gesponsord door AT-Computing |
Keysigning party (download manual) |
|
true |
3 |
|
|
|