Mirna Alaisami Thorsten Jakoby
Novatec Consulting GmbH
Mirna Alaisami is a Senior Consultant at Novatec Consulting GmbH with focus on Cloud Technologies and Platforms. She supports and advises customers on building cloud architectures and migrating to various cloud platforms. She also develops and delivers training topics related to microservice development and CI/CD with the technology stacks of Spring Boot, Docker, Kubernetes and Cloud Foundry.
In addition to her role as a consultant, she actively blogs for Novatec, supports meetups and user groups, has been guest lecturer at different universities around Stuttgart, and speaker at various conferences and meetups (such as Cloud Foundry Summit, ContainerDays, JCON, European Cloud Summit, IT-Tage Frankfurt).
Thorsten Jakoby is a consultant for IT-Architectures and Cloud Migrations at Novatec in Germany. He is currently technical lead for an enterprise-scale cloud migration at a global client. With a background of 10 years in distributed applications Thorsten enables both customers building cloud architectures and students entering the IT and cloud world. Prior to his role at Novatec he led a company specialized in cloud-based startup projects. Besides his role as consultant, he also speaks on meetups and conferences (like Cloud Foundry Summit EU, W-JAX, OOP).
Live Hacking Cloud Architectures
As more organizations are moving to the cloud, cloud architectures are getting more sophisticated by having a kind of technology diversity. This includes for example container orchestrators, database services, event meshes, networking components and virtual machines.
When it comes to security, observability on this diversity is paramount. The main question here is, do you really perceive when your app landscape is under attack?
In this session, you will have the opportunity to see various attack vectors and ways to mitigate and observe them. Many technologies will be used such as Kubernetes, eBPF, Cillium, Falco and much more!
Come and watch a live attack on a real-world based cloud architecture and see the attacker scan web applications and start lateral movement with the goal of exfiltrating data. Furthermore, become a part of the blue-team, defending and securing the architecture with modern open source tools.