| row |
columns |
|
|
|
| column |
textfield |
size |
center |
|
| text |
| Inschrijving, ontvangst, koffie |
|
3 |
true |
|
|
|
| row |
columns |
|
|
|
| column |
textfield |
center |
size |
|
|
true |
3 |
|
|
|
| row |
columns |
|
|
|
| column |
talk |
center |
size |
|
| speaker |
title |
keynote |
link |
| Lucinda Sterk |
Talk nerdy to me |
true |
|
|
true |
3 |
|
|
|
| row |
columns |
|
|
|
| column |
textfield |
center |
size |
|
|
true |
3 |
|
|
|
| row |
columns |
|
|
|
| column |
talk |
|
| speaker |
title |
link |
| Riccardo ten Cate en Glenn ten Cate |
Exploitation, automation, mitigation |
|
|
|
| column |
talk |
|
| speaker |
title |
| Mike Ciavarella |
This is just temporary |
|
|
| column |
talk |
|
| speaker |
title |
| Melchior Aelmans |
Exploring quantum Technology for Networking |
|
|
|
|
|
|
| row |
columns |
|
|
|
| column |
talk |
|
| speaker |
title |
| Rob Hulsebos |
OT Cybersecurity Challenges |
|
|
| column |
talk |
|
| speaker |
title |
| Michiel Leenaars |
NLnet and NGI Zero: working for the internet |
|
|
| column |
talk |
|
| speaker |
title |
| Sake Blok |
LOG4SHELL: Getting to know your adversary |
|
|
|
|
| row |
columns |
|
|
|
| column |
textfield |
center |
size |
|
|
true |
3 |
|
|
|
| row |
columns |
|
|
|
| column |
talk |
|
| speaker |
title |
| Francisco Dominguez and Zawadi Done |
Automating incindent response should be the default |
|
|
| column |
talk |
|
| speaker |
title |
| Andreas Hülsing |
An update on NIST's PQC standardization process |
|
|
| column |
talk |
|
| speaker |
title |
| Kris Buytaert |
Help My Datacenter is On Fire |
|
|
|
|
|
|
| row |
columns |
|
|
|
| column |
talk |
|
| speaker |
title |
| Jean-Paul Sablerolle |
Power to the Open Source |
|
|
| column |
talk |
|
| speaker |
title |
| Filip Chyla |
Cloud-Native Security with the OWASP Cloud-Native Application Security Top 10 |
|
|
| column |
talk |
|
| speaker |
title |
| Toshaan Bharvani |
Why Open Technologies need to use Open Technologies |
|
|
|
|
| row |
columns |
|
|
|
| column |
textfield |
center |
size |
|
|
true |
3 |
|
|
|
| row |
columns |
|
|
|
| column |
talk |
|
| speaker |
title |
| Marcel van der Velde |
Heuristic Park (why we can fake it until we make it) |
|
|
| column |
talk |
|
| speaker |
title |
link |
| Ondřej Caletka |
Run your own networking lab with Vagrant and Ansible |
|
|
|
| column |
talk |
|
| speaker |
title |
| Joost van Dijk |
From passwords to passkeys: What's new with FIDO |
|
|
|
|
|
|
| row |
columns |
|
|
|
|
|
| column |
talk |
|
| speaker |
title |
link |
| Marcel Kornegoor |
Course as Code: the future of AT Computing's training courses |
|
|
|
| column |
talk |
|
| speaker |
title |
| Joyce Mellens |
Caer: An IoT Firewall for consumers |
|
|
|
|
| row |
columns |
|
|
|
| column |
textfield |
center |
size |
|
| text |
| Borrel, gesponsord door AT-Computing, en keysigning party (download manual) |
|
true |
3 |
|
|
|