Hi [[ session.user.profile.firstName ]]

Contact Tracing 101

How does contact tracing work?

The current health crisis has forced countries to consider the use of mobile contact-tracing to track and control the spread of the virus. This video provides an introduction to this strategy, the proposed use, and initial implications on privacy and mobile security.

-What is contact tracing?
-Technical Implementation in China and South Korea
-Technical Implementation in the Apple/Google proposal
-Alternative options to protect data while saving lives
Recorded May 4 2020 13 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Alban Diquet, Head of Engineering at Data Theorem
Presentation preview: Contact Tracing 101

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Contact Tracing 101 Recorded: May 4 2020 13 mins
    Alban Diquet, Head of Engineering at Data Theorem
    How does contact tracing work?

    The current health crisis has forced countries to consider the use of mobile contact-tracing to track and control the spread of the virus. This video provides an introduction to this strategy, the proposed use, and initial implications on privacy and mobile security.

    -What is contact tracing?
    -Technical Implementation in China and South Korea
    -Technical Implementation in the Apple/Google proposal
    -Alternative options to protect data while saving lives
  • Security Automation on AWS Recorded: Mar 19 2020 19 mins
    Felicia Haggarty and James Galt, Data Theorem
    How can we prevent data breaches that are caused by very simple processes like closing an AWS bucket?

    The crown jewel of DevSecOps is not only identifying vulnerabilities and analyzing them, but being able to resolve them before there is a breach. Automating this last step solves several problems:

    *Less exposure time means less chance of breach
    *Saves time fixing the violation or learning how to fix it
    *Developers need not get involved with every security incident

    In this session, we will show you an example of a customer that had an unauthenticated queue on AWS, how it was resolved, and how these failed attacks extend their cloud security posture.
  • How to Automate Mobile AppSec without the Staff Recorded: Feb 11 2020 33 mins
    Richard Smith, Director at Data Theorem
    Overcoming the challenges of manual mobile AppSec with automation.

    The demand for mobile apps has caused a need for developers to improve and release features at an unprecedented rate to stay ahead of the competition. Consequently, developers have introduced new models to develop mobile apps quicker and easier.

    In these fast-paced development cycles, the risk of data security vulnerabilities and breach of regulatory requirements becomes more important than ever. With such an industry trend comes an imperative need to innovate the approach to mobile AppSec.

    Join us to learn about the:

    *Top challenges and problems facing security teams for mobile AppSec.
    *Limitations of traditional mobile AppSec approaches and why a manual processes will not scale with DevOps.
    *Ways to automate your mobile AppSec program to meet the fast pace demands of modern SDLCs without the staff.
  • How Hackers Hack Your APIs in 15 Minutes or Less Recorded: Jan 31 2020 19 mins
    Himanshu Dwivedi, CEO at Data Theorem
    It is very hard, if not impossible, to secure something you don’t know exist. While security professionals spend countless hours on complex yet interesting issues that *may* be exploitable in the future, basic attacks are occurring every day with little to reviews. For example, a “dated trend” by effective yet lazy hackers is to search for API unknown by security teams, coined “Shadow APIs”, connect to these APIs, and extract data. While SQL Injection used to be the hack of choice, as a few simple SQL commands would either mean “pay dirt” or “move on to the next target”, the same can be said for Shadow API….Find, Connect, Extract. This talk will discuss one of many methods that are used in the wild to target Shadow APIs and export large volumes of data with a few clicks of a button (lines of code in python code :). Attendees will learn about a very basic yet non-so-obvious problem in securing data, and how hackers are using creative methods to steal large volumes of data.
  • Automated Security for DevOps Recorded: Jan 15 2020 2 mins
    Data Theorem
    Data Theorem delivers automated security for DevOps, ushering in a new era of DevSecOps. This helps teams grow faster with fewer application security exposures.
  • Did You Know CCPA Has Already Begun? Recorded: Dec 10 2019 26 mins
    Richard Smith, Director, Data Theorem
    How to prepare your data, mobile apps, web apps, and APIs

    On January 1, 2020, the California Consumer Privacy Act (CCPA) will go into effect. This new privacy law emphasizes the growing importance for companies to revisit their approach on how they handle consumer data. Recent GDPR violations have shown that exposure via poor mobile app security and leaky APIs can result in multi-million dollar fines. But security leaders may not be aware that consumers will be able to make requests to in-scope business for the 2019 calendar year. Learn how to prepare for this legislation, security audits, and future data privacy laws without the staff.

    In this webinar we will cover :

    *How this legislation affects your company and customer data
    *How it impacts your mobile and modern web app strategy
    *How you can start preparing your current data, apps, and API’s before the law goes into effect
  • How to Leverage iOS 13 for App Security Recorded: Nov 19 2019 27 mins
    Phillip Tennen, iOS Software Engineer, Data Theorem
    Get briefed quickly on the latest security changes on iOS 13.

    Led by Phillip Tennen of Data Theorem, the webinar explores some important changes landing with iOS 13 this fall. The webinar will discuss new encryption APIs that make it easier to securely and correctly encrypt data, new requirements for data collection, system-level changes into the availability and visibility of user tracking, and so much more. The webinar will close with the the new services Apple is bringing forward that can be leveraged in your applications to deliver a smooth and more secure experience to your users.

    In this webinar you will learn about:

    *New APIs for securing data and changes to existing frameworks in iOS 13
    *New limits placed on data collection
    *New options for visualizing the data collected by apps
    *New system services that enhance user security
    *Changing requirements for an app's security posture
  • Automate Compliance Audits without the Staff Recorded: Nov 14 2019 29 mins
    Himanshu Dwivedi, CEO
    How to deliver continuous compliance for APIs and mobile apps.

    With so many consequential data breaches in the past decade, data security and privacy are top of mind issues for security leaders and corporate boards. Numerous government and industry regulations like HIPAA, PCI, GDPR, and FERPA are designed to focus attention on securing data and keeping personal information private. Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation.

    Join us to learn about the:

    Challenges of manual compliance audits and their inability to keep pace with modern software development (CI/CD, DevOps, Agile).
    Benefits of automating continuous security compliance testing and reporting to meet the demands on regulators, partners and customers.
    Successful augmentation of an in-house security team by replacing expensive outside consultants.
  • How to Leverage iOS 13 for App Security Recorded: Oct 30 2019 27 mins
    Phillip Tennen, iOS Software Engineer, Data Theorem
    Get briefed quickly on the latest security changes on iOS 13.

    Led by Phillip Tennen of Data Theorem, the webinar explores some important changes landing with iOS 13 this fall. The webinar will discuss new encryption APIs that make it easier to securely and correctly encrypt data, new requirements for data collection, system-level changes into the availability and visibility of user tracking, and so much more. The webinar will close with the the new services Apple is bringing forward that can be leveraged in your applications to deliver a smooth and more secure experience to your users.

    In this webinar you will learn about:

    *New APIs for securing data and changes to existing frameworks in iOS 13
    *New limits placed on data collection
    *New options for visualizing the data collected by apps
    *New system services that enhance user security
    *Changing requirements for an app's security posture
  • How Low-Tech Hackers Hack Your APIs in 15 Minutes or Less Recorded: Oct 23 2019 19 mins
    Himanshu Dwivedi, CEO at Data Theorem
    It is very hard, if not impossible, to secure something you don’t know exist. While security professionals spend countless hours on complex yet interesting issues that *may* be exploitable in the future, basic attacks are occurring every day with little to reviews. For example, a “dated trend” by effective yet lazy hackers is to search for API unknown by security teams, coined “Shadow APIs”, connect to these APIs, and extract data. While SQL Injection used to be the hack of choice, as a few simple SQL commands would either mean “pay dirt” or “move on to the next target”, the same can be said for Shadow API….Find, Connect, Extract. This talk will discuss one of many methods that are used in the wild to target Shadow APIs and export large volumes of data with a few clicks of a button (lines of code in python code :). Attendees will learn about a very basic yet non-so-obvious problem in securing data, and how hackers are using creative methods to steal large volumes of data.
  • Kids, Privacy, and Apps Recorded: Sep 11 2019 23 mins
    Himanshu Dwivedi, CEO at Data Theorem
    Everyday we read headlines about data breaches and data privacy, but how can we start being pro-active about managing data privacy in apps for us and our kids? We have some guidelines to share with you, as well as a quick demo to show you some tools you can use now and discuss how companies should be safeguarding data.

    In this webinar we will cover:

    *How you can start securing your mobile data today
    *What kinds of data put you at risk (location data, personal information, photos)
    *How we look at app privacy as a company, as well as parents
  • Serverless vs Containers: A Case Study Recorded: Aug 28 2019 30 mins
    Alban Diquet, Head of Engineering at Data Theorem
    See the results from Data Theorem’s head-to-head experiment on building and securing real-world microservices.

    Join Alban Diquet, Head of Engineering at Data Theorem, as he discusses how Serverless performed versus Containers in a head-to-head experiment. Data Theorem implemented a back end component to compare each technology to determine which is better in several key areas that critical are for developers. This webinar will showcase what Alban and his engineering team discovered in this experiment, which should help you make your own determination of what's best for your organization.

    Specifically, you'll learn:

    *Which was better in terms of developer experience
    *How each performed with regard to cost
    *Which has the best opportunities for scale
    *What to consider in terms of security
  • How to Automate an API Security Program Recorded: Aug 14 2019 23 mins
    Doug Dooley, COO, Data Theorem
    Learn the prominence of APIs in today’s landscape and how to build an API security framework.

    Join Doug Dooley, COO at Data Theorem, as he discusses the pressing need to automate API security. As modern companies grow, they expose their data to an increasing number of outside applications. It's critical that DevOps and Security teams are aligned on how to scale their API connections while automating the protection of their data from potential threats.

    Specifically, you'll learn:

    *The prominence of APIs in today's landscape
    *About the challenges of securing APIs
    *How to create an API security framework
    *Why automation is the key
  • How to Automate Mobile AppSec without the Staff Recorded: Aug 13 2019 33 mins
    Richard Smith, Director at Data Theorem
    Overcoming the challenges of manual mobile AppSec with automation.

    The demand for mobile apps has caused a need for developers to improve and release features at an unprecedented rate to stay ahead of the competition. Consequently, developers have introduced new models to develop mobile apps quicker and easier.

    In these fast-paced development cycles, the risk of data security vulnerabilities and breach of regulatory requirements becomes more important than ever. With such an industry trend comes an imperative need to innovate the approach to mobile AppSec.

    Join us to learn about the:

    *Top challenges and problems facing security teams for mobile AppSec.
    *Limitations of traditional mobile AppSec approaches and why a manual processes will not scale with DevOps.
    *Ways to automate your mobile AppSec program to meet the fast pace demands of modern SDLCs without the staff.
  • Did You Know CCPA Has Already Begun? Recorded: Aug 1 2019 27 mins
    Richard Smith, Director, Data Theorem
    How to prepare your data, mobile apps, web apps, and APIs

    On January 1, 2020, the California Consumer Privacy Act (CCPA) will go into effect. This new privacy law emphasizes the growing importance for companies to revisit their approach on how they handle consumer data. Recent GDPR violations have shown that exposure via poor mobile app security and leaky APIs can result in multi-million dollar fines. But security leaders may not be aware that consumers will be able to make requests to in-scope business for the 2019 calendar year. Learn how to prepare for this legislation, security audits, and future data privacy laws without the staff.

    In this webinar we will cover :

    *How this legislation affects your company and customer data
    *How it impacts your mobile and modern web app strategy
    *How you can start preparing your current data, apps, and API’s before the law goes into effect
  • Automate Compliance Audits without the Staff Recorded: Jul 24 2019 29 mins
    Himanshu Dwivedi, CEO
    How to deliver continuous compliance for APIs and mobile apps.

    With so many consequential data breaches in the past decade, data security and privacy are top of mind issues for security leaders and corporate boards. Numerous government and industry regulations like HIPAA, PCI, GDPR, and FERPA are designed to focus attention on securing data and keeping personal information private. Agile and DevOps development models are moving too quickly for manual security assurance and compliance validation.

    Join us to learn about the:

    Challenges of manual compliance audits and their inability to keep pace with modern software development (CI/CD, DevOps, Agile).
    Benefits of automating continuous security compliance testing and reporting to meet the demands on regulators, partners and customers.
    Successful augmentation of an in-house security team by replacing expensive outside consultants.
  • Top 6 Security Needs for APIs and Serverless Apps Recorded: Jul 18 2019 36 mins
    Doug Dooley, COO
    Securing APIs across Amazon Lambda, Google Cloud Functions and Azure Functions

    Serverless computing is gaining momentum among developers. Software engineers are now able to build applications that deliver scale and business value without consideration for the complexity of operations and security. However, to believe there are fewer security problems with serverless applications would be an unwise assumption. Security problems still exist with serverless, but our focus needs to shift particularly to the world of application programming interfaces (APIs) where sensitive data is prominently transferred in these modern application designs.

    Watch this webinar to learn about:

    -Top 6 API security needs for serverless apps
    -5 problems security teams face with APIs in serverless and modern Apps
    -Limitations to legacy API security solutions such as API gateways
  • How to Deal with Fraudulent Counterfeit Apps Recorded: Jul 18 2019 20 mins
    Richard Smith, Director
    Overcoming the challenges of fraudulent counterfeit apps and their business impacts.

    Fraudulent counterfeit apps are a growing problem, not only for unsuspecting consumers, but for developers of legitimate apps whose customers interact with fake imposters of their software. Fake apps are big business for malicious actors, especially if they can leverage the brand and customer base of a well-known company.

    Watch to learn about:

    -Impacts of fraudulent counterfeit apps on your business and brand
    -Challenges of finding and removing counterfeit apps
    -Ways automation can make dealing with counterfeit apps easy
  • Automating Software Security Checks for Open Source Software and SDKs Recorded: Jul 18 2019 27 mins
    Eric Castro, Engineer at Data Theorem
    A modern approach to security checks for third-party software through automation.

    The growth of open source software (OSS) and third-party SDKs has been on the rise over the last five years, and for good reason. They provide developers with many of the necessary features to build a robust and dynamic apps increasing the appeal to a wider range of users.

    While the value of using OSS and SDKs is obvious to most, there is also a downside to incorporating someone else’s code into your app. There can be privacy violations, security vulnerabilities, and other risks embedded in the third-party code. This puts the onus on development teams and their security counterparts to ensure that unsound code in OSS and SDKs is found and fixed before use.

    Join us to learn about:

    -Risks of using open source software and SDKs for your apps.
    -Challenges of staying ahead of vulnerability issues in third-party software.
    -Modern approach to security checks for third-party software through automation.
API, app, mobile, and cloud security best practices
Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Contact Tracing 101
  • Live at: May 4 2020 4:00 pm
  • Presented by: Alban Diquet, Head of Engineering at Data Theorem
  • From:
Your email has been sent.
or close