Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration
    • Discounts
    • Venue, Hotel, and Travel
    • Why Attend?
    • Students and Grants
    • Speaker Resources
  • Program
    • Program at a Glance
    • Conference Program
    • Training Program
    • Workshop Program
    • Conference Topics
    • Co-Located Events
      • URES '14 West
      • SESA '14
      • Puppet Camp Seattle
      • LISA Data Storage Day
      • CentOS Dojo Seattle
    • Activities
      • LISA Build
      • LISA Lab
      • Birds-of-a-Feather Sessions
      • Poster Session
      • LISA14 Expo
  • Sponsors and Expo
    • LISA14 Expo
    • Sponsors/Exhibitors List
    • Exhibitor Services
    • Download Prospectus (PDF)
  • About
    • Conference Organizers
    • Past Conferences
    • Services
    • Contact Us
    • Code of Conduct
    • Original Call for Participation
    • Help Promote

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

why attend lisa?

"I use LISA to benchmark the SA activities in my company."

LISA '13 Attendee

"LISA is where I find direction for evolving the my core professional skills."

LISA '13 Attendee

"LISA is the conference that I send my system administrators to so they can bring the latest tools and techniques back to the rest of the team. Much of our current environment can be traced directly back to LISA."

Cory Lueninghoener, Deputy Group Leader of Production High Performance Computing at Los Alamos National Laboratory

"LISA is where professionals share what's hot in designing, building, and maintaining critical systems."

Tom Limoncelli, author, speaker, and system administrator

"LISA is the conference that I send my system administrators to so they can bring the latest tools and techniques back to the rest of the team. Much of our current environment can be traced directly back to LISA."

Cory Lueninghoener, Deputy Group Leader of Production High Performance Computing at Los Alamos National Laboratory

"I keep coming back for the technical content and the personal networking opportunities. I attend for career development."

LISA '13 Attendee

"LISA is where professionals share what's hot in designing, building, and maintaining critical systems."

Tom Limoncelli, author, speaker, and system administrator

"Information from LISA helps us push the envelope on automation and scaling, allowing a team of four to manage over 3000 Firefox build and test systems running 15 different operating systems."

Amy Rich, Manager of Release Engineering Operations at Mozilla

"LISA is the place where industry best practices and cutting-edge research come together to advance system administration."

Nicole Forsgren Velasquez, Utah State University

help promote

LISA16 CFP button

Get more
Help Promote graphics!

sponsors

Gold Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
General Sponsor
General Sponsor
General Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner
Industry Partner
Industry Partner
Industry Partner
Industry Partner

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

Site Map

You are here

Home ยป Mark Miller, Sonatype
Tweet

connect with us

http://twitter.com/lisaconference
https://www.facebook.com/usenixassociation
http://www.linkedin.com/groups/USENIX-Association-49559/about
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation

Mark Miller

Over the past year, I have become more concerned about software vulnerabilities we unknowingly allow into our homes and lives. What are the implications of networking our kitchen appliances, embedding open source components into everything that we touch? Why are we allowing unmoderated access to our personal information just to play simple games on our mobile devices? What does it mean to have unmonitored computer components running your car? Who is managing and validating the components that now make up 90% of most major software applications?

I am building a community of DevOps and AppSec practitioners that acknowledge these issues through the use of multiple platforms (video, podcasts, surveys, advocacy programs) to promote the active monitoring of open source, component based projects.

Linked Presentation: 
Developers and Application Security: Who is Responsible?

Gold Sponsors

Silver Sponsors

Bronze Sponsors

General Sponsors

Media Sponsors & Industry Partners

© USENIX

  • Privacy Policy
  • Contact Us

LISA is a registered trademark of the USENIX Association.