Thought leaders come together to discuss the futureof developer relations in a remote-first world

SlashData | September 19, 2020

Thought leaders come together to discuss the futureof developer relations in a remote-first world

 

For immediate release
London, United Kingdom
Media contact at SlashData Ltd.
Viktorija Ignataviciute viktorija@slashdata.co

Best practises engaging Open Source and DevOps developers Developer trends; Tracking Covid effect on the industry

While industries, businesses and individuals are being challenged significantly, the Future Developer Summit is determined to turn this into an enhanced learning opportunity, open to all Developer Relations, Marketing and Advocacy community members.
 

Traditionally hosted in the Bay Area, CA, the 5th Future Developer Summit invites its guests to join the event remotely on 29-30 Sep & 6-7 Oct, ensuring the safety of all stakeholders. For the first time this year, the Summit offers 2 tracks: Open Source and DevOps.
 

Thought leaders at the Future Developer Summit


Industry leaders are coming together to discuss the future of developer marketing and developer relations. Director and VP level representatives from CNCF, Google, Microsoft, Comcast, HashiCorp, Intel, Salesforce, Facebook, MongoDB, Futurewei, Eclipse Foundation, Indeed.com, Expedia, Nutanix, and more.
 

Jono Bacon - author of “People Powered” and Mary Thengvall - Director of Developer Relations at Camunda are joining as event’s co-hosts. Follow new announcements at futuredeveloper.io/
 

Keynotes by:

• Mike Milinkovich, Executive Director at Eclipse Foundation
• Nithya Ruff, Executive Director, OSPO at Comcast
• Stormy Peters, Director of Open Source Programs Office at Microsoft
• Adam FitzGerald, VP, Developer Relations at HashiCorp
 

Lightning talks - hear about successes and failures from:

• Melissa Evers-Hood - VP, Intel Architecture, Graphics and Software at Intel
• Priyanka Sharma - General Manager at CNCF
• Chris Kelly - Director, Open Source and Engineering Engagement at Salesforce
• Grace Francisco - VP, Global Developer Relations & Education at MongoDB
• Anni Lai - Head of Open Source Operations and Marketing, Cloud at Futurewei
• Duane O'Brien - Head of Open Source at Indeed.com
• Tobie Langel - Principal and founder, UnlockOpen
• Satya Singh - Principal Product Manager - Platform & Marketplaces at Expedia
• Mark Lavi - DevOps and Automation Solutions Architect at Nutanix
• Tamao Nakahara - Head of Developer Experience at Weaveworks
• Amr Awadallah - VP, Developer Relations at Google
 

The highlights

• On 29-30 Sep & 6-7 Oct. Full agenda at futuredeveloper.io/
• The highest rated industry event with a Net Promoter Score - 94!
• Co-hosts:
- Jono Bacon - author of “People Powered”
- Mary Thengvall - Director of Developer Relations at Camunda
• Remote friendly event for the global tech leaders community
• Summit offers 2 tracks: Open Source and DevOps
• 2 networks to join: Community and Exclusive
• Registration is free for all attendees. We do invite you to voluntarily contribute to Black Girls Code
• This year’s Summit coincides with SlashData’s 10-year anniversary of developer research. Join us to celebrate together!

▶ Reporters can redeem the Media Pass here.
▶ General Admission is available here.
 

*Senior audience only

Exclusive edition - announcement


The Future Developer Summit is opening its doors in 2 weeks! Don’t miss a chance to join an outstanding crew of industry thought leaders bringing the best learning experience for Developer Relations, Marketing and Advocacy community members.
 

Exclusive edition on 6-7 October
Your Unique Executive Networking Opportunity in a remote-first world
 

Two industry panels
How do industry leaders approach contribution to open source?
 

Speakers:

• Sam Ramji - Chief Strategy Officer at DataStax
• Chris DiBona - Director of Open Source at Google
• Nithya Ruff - Executive Director, OSPO at Comcast
• Stormy Peters - Director of Open Source Programs Office at Microsoft
 

The diversity of DevOps approaches and how customers are adopting it?
 

Speakers:
• Kelsey Hightower - Staff Developer Advocate, Google Cloud Platform at Google
• Greg Wilson - Director of Cloud Developer Relations at Google
• Nicole Forsgren - VP, Research and Strategy at GitHub
• TBA very soon!
 

Two fireside chats with:
 

• Jono Bacon - author of “People Powered”
• Kathy Kam - Head of Open Source & Developer Advocacy at Facebook
 

Two Master Classes
 

Using practical examples, and a lot of data as usual, we will be demonstrating how you can increase your DevRel ROI by taking data-backed decisions and what are the key reasons for using data in your decision making process.
 

Availability is limited → Secure Your Executive Seat

Spotlight

Mike Denning, Senior Vice President and General Manager for CA Technologies security business, speaks with Leanne Agurkis of CA Technologies at RSA Conference 2014 about the challenges that enterprise IT customers face around balancing the demand for highly usable on-premise and mobile apps with the need to secure them against malware unauthorized users.

Related News

DATA SECURITY

NPCore forms global partnership with Viet Cyber Security towards expansion into SE Asian IT security market

NPCore | November 26, 2021

NPCore, a joint venture member of Born2Global Centre, has its sights set on a greater share of the IT security market in Southeast Asia, recently joining forces with Vietnamese IT security service provider Viet Cyber Security. Together, the two companies set up NPCore Vietnam Joint Stock Company, a joint venture which will see them coordinate efforts in the IT security industry. NPCore is an AI-based new variant malware (APT) response solution provider offering optimal security solutions. NPCore has provided cyber security solutions and since 2021, it has participated in a project for supporting overseas expansion of D.N.A (Data, Network, AI) convergence products led by Born2Global Centre. The joint enterprise will see the two partners collaborate in technology and, more importantly, concerted sales and marketing activities in the Southeast Asian IT security market. The goal is to lay the foundation for a stable supply of IT security services in local markets to obtain market trust and continue expanding the business at an increasing pace. NPCore has confirmed that it is ready to aggressively engage Viet Cyber Security's local networks and customers towards expanding its market presence. NPCore's solution (Zombie Zero) can defend against any path through which malicious code can flow from the network to the endpoint. It currently holds 12 patents as well as the International Common Criteria (CC) certification for its proprietary security technologies and has more than 100 global references. "The local joint enterprise was established in Vietnam as it is a market with active investment taking place in national security, corporate IT security, and other fields. It will be a local platform for entry into the Southeast Asian markets Vietnam included and will put us on the map as an IT security service provider in the region." NPCore CEO Han Seung-cheol Furthermore, the joint venture between NPCore and Viet Cyber Security was established as part of the Born2Global Centre's partnership program. Through its support of DNA-convergence products and services, Born2Global Centre serves as a launchpad for innovative startups to enter global markets. Born2Global Centre provides startups with different levels of consulting services, from partnership exploration & creation to business establishment, operations, joint R&D projects, and market expansion.

Read More

NETWORK THREAT DETECTION

Lacework Quarterly Cloud Threat Report Shows the Automated Techniques Cybercriminals are Using to Attack Businesses in the Cloud

Lacework | August 31, 2021

Lacework, the data-driven security platform for the cloud, today released its quarterly cloud threat report, unveiling the new techniques and avenues cybercriminals are infiltrating to profit from businesses. The rapid shift of applications and infrastructure to the cloud creates gaps in the security posture of organizations everywhere. This has increased the opportunities for cybercriminals to steal data, take advantage of an organization's assets, and to gain illicit network access. "It's in enterprises' best interest to start thinking of cybercriminals as business competitors," said James Condon, Director of Research at Lacework. "Last year alone, cybercrime and ransomware attacks cost companies $4 billion in damages. As more companies shift to cloud environments, we're seeing an increase in demand for stolen access to cloud accounts and evolving techniques from cybercriminals, making enterprises even more vulnerable to cloud threats." New research from Lacework Labs, the dedicated research team at Lacework that focuses on new threats and attack surface risks within the public cloud, sheds light on the crimeware and growing ransomware landscape in the face of new threat models and emerging cybersecurity challenges. Based on anonymized data across the Lacework platform from May 2021 - July 2021, key findings of the report include: Initial Access Brokers (IABs) Expand to Cloud Accounts As corporate infrastructure continues to expand to the cloud, so do opportunistic adversaries as they look to capitalize on the opportunity. Illicit access into cloud infrastructure of companies with valuable data/resources or wide-reaching access into other organizations offers attackers an incredible return on investment. In particular, Lacework Labs found Amazon AWS, Google Cloud, and Azure administrative accounts are gaining popularity in underground marketplaces. Threat Actor Campaigns Continue to Evolve: Lacework Labs has observed a variety of malicious activity originating from known adversary groups and malware families. This section showcases those who continue evolving their operators as a valuable return on investment: 8220 Gang Botnet and Custom Miner: Lacework Labs recently found a new cluster of activity linked to an 8220 Gang adversary group campaign of infecting hosts, primarily through common cloud services, with a custom miner and IRC bot for further attacks and remote control. This cluster shows operations are evolving on many levels, including efforts of hiding botnet scale and mining profits.This is indicative of attacks growing in size. TeamTNT Docker Image Compromise: The Lacework Labs team discovered threat actor TeamTNT backdooring legitimate Docker Images in a supply chain-like attack. Networks running the trusted image were unknowingly infected. Developer teams need to be certain they know what's in the image they pull. They need to validate the source or they could open a door to their environment. Popular cloud relevant crimeware and actors: Cpuminer, the open-source multi-algorithm miner, has been legitimately used for years. However, Lacework Labs observed an increase in its illicit use for cryptomining altcoins. Monero and XMRig are the most common accounts for cryptomining against cloud resources, hence activity involving lesser-seen coins and tools may be more likely to go undetected. Cloud services probing: Lacework Labs captures a range of telemetry in both product deployments and custom honeypots, which allows the company to see trends relevant to cloud defense purposes. For these sources, many cloud-relevant applications are continually targeted, but Lacework found that AWS S3, SSH, Docker, SQL and Redis were by far the most targeted. Based on the findings of this report, Lacework Labs recommends that defenders: Ensure Docker sockets are not publicly exposed and appropriate firewall rules/ security groups and other network controls are in place. This will help to prevent unauthorized access to network services running in an organization. Ensure the access policies you set via the console on S3 buckets are not being overridden by an automation tool. Frequent auditing of S3 policies and automation around S3 bucket creation can ensure data stays private. About Lacework Lacework is the data-driven security platform for the cloud. The Lacework Cloud Security Platform, powered by Polygraph, automates cloud security at scale so our customers can innovate with speed and safety. Polygraph is the only security solution that can collect, analyze, and accurately correlate data across an organization's AWS, Azure, GCP, and Kubernetes environments, and narrow it down to the handful of security events that matter. Customers all over the globe depend on Lacework to drive revenue, bring products to market faster and safer and consolidate point security solutions into a single platform. Founded in 2015 and headquartered in San Jose, Calif., with offices all over the world, Lacework is backed by leading investors like Sutter Hill Ventures, Altimeter Capital, Liberty Global Ventures, and Snowflake Ventures, among others.

Read More

DATA SECURITY

When Safeguarding Digital Communications,IT Security Leaders Come Across Continued Vulnerabilities

SafeGuard Cyber | July 13, 2021

The only SaaS platform dedicated to managing the entire lifecycle of digital risk protection, SafeGuard Cyber, has released conclusions from a survey of 100 IT security leaders about their safeguarding digital communications and digital risk processes. The finding of the survey indicates that cybersecurity leaders recognize what is required for adequate digital risk protection. But, they are still dealing with boundaries and susceptibilities in defending these communications, such asthird-party cloud application engagement. The survey was conducted in June 2021 in coordination with the research community Pulse. The main point covered in the survey was uncovering how cybersecurity leaders are managing digital risks on third-party applications. In addition, the survey was also focused on recognizing who owns the responsibility for securing them and what all can be done to progress their administration's security posture for various cloud applications. 100 senior enterprise IT and security professionals from companies with over 5,000 employees were included in the survey. The main findings from the survey include: • The biggest challenge for security leaders, who targets to uphold security and compliance across all professional communications, is lack of visibility (39%) • Security leaders are most concerned about data loss (46%) regarding digital communication risks, followed by malware and ransomware attacks (37%). • Only 10% of cybersecurity leaders have a tech stack that provides complete visibility for detecting and responding to threats in cloud applications outside of their network. • Security leaders often restrict access as a means of managing risk where they lack granular visibility. For example, to ensure security and compliance on social media, collaboration, and mobile chat applications, most security leaders (77%) turn to tools that restrict access to third-party communication apps. About SafeGuard Cyber  SafeGuard Cyber guards the human connections establishments need to flourish in a digital world. The cloud-native SafeGuard platform authorizes the secure and compliant acceptance of social, mobile, and cloud-based communication channels at the scale of worldwide corporate. With SafeGuard, customers gain business agility with better security and time to value. Current customers include small businesses, Global100 enterprises, municipalities, and various national governments.

Read More

Spotlight

Mike Denning, Senior Vice President and General Manager for CA Technologies security business, speaks with Leanne Agurkis of CA Technologies at RSA Conference 2014 about the challenges that enterprise IT customers face around balancing the demand for highly usable on-premise and mobile apps with the need to secure them against malware unauthorized users.