Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration
    • Discounts
    • Venue, Hotel, and Travel
    • Why Attend?
    • Students and Grants
    • Speaker Resources
  • Program
    • Program at a Glance
    • Conference Program
    • Training Program
    • Workshop Program
    • Conference Topics
    • Co-Located Events
      • URES '14 West
      • SESA '14
      • Puppet Camp Seattle
      • LISA Data Storage Day
      • CentOS Dojo Seattle
    • Activities
      • LISA Build
      • LISA Lab
      • Birds-of-a-Feather Sessions
      • Poster Session
      • LISA14 Expo
  • Sponsors and Expo
    • LISA14 Expo
    • Sponsors/Exhibitors List
    • Exhibitor Services
    • Download Prospectus (PDF)
  • About
    • Conference Organizers
    • Past Conferences
    • Services
    • Contact Us
    • Code of Conduct
    • Original Call for Participation
    • Help Promote

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

why attend lisa?

"LISA is where I find direction for evolving the my core professional skills."

LISA '13 Attendee

"LISA is the conference that I send my system administrators to so they can bring the latest tools and techniques back to the rest of the team. Much of our current environment can be traced directly back to LISA."

Cory Lueninghoener, Deputy Group Leader of Production High Performance Computing at Los Alamos National Laboratory

"LISA is the place where industry best practices and cutting-edge research come together to advance system administration."

Nicole Forsgren Velasquez, Utah State University

"I keep coming back for the technical content and the personal networking opportunities. I attend for career development."

LISA '13 Attendee

"Information from LISA helps us push the envelope on automation and scaling, allowing a team of four to manage over 3000 Firefox build and test systems running 15 different operating systems."

Amy Rich, Manager of Release Engineering Operations at Mozilla

"LISA is where professionals share what's hot in designing, building, and maintaining critical systems."

Tom Limoncelli, author, speaker, and system administrator

"I use LISA to benchmark the SA activities in my company."

LISA '13 Attendee

"LISA is the conference that I send my system administrators to so they can bring the latest tools and techniques back to the rest of the team. Much of our current environment can be traced directly back to LISA."

Cory Lueninghoener, Deputy Group Leader of Production High Performance Computing at Los Alamos National Laboratory

"LISA is where professionals share what's hot in designing, building, and maintaining critical systems."

Tom Limoncelli, author, speaker, and system administrator

help promote

LISA16 CFP button

Get more
Help Promote graphics!

sponsors

Gold Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
General Sponsor
General Sponsor
General Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner
Industry Partner
Industry Partner
Industry Partner
Industry Partner

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

Site Map

You are here

Home » Topic: Security
Tweet

connect with us

http://twitter.com/lisaconference
https://www.facebook.com/usenixassociation
http://www.linkedin.com/groups/USENIX-Association-49559/about
https://plus.google.com/108588319090208187909/posts
http://www.youtube.com/user/USENIXAssociation

Topic: Security

LISA14: Security

Training

Monday, November 10, 2014 - 9:00 am-5:00 pm
M4
Hands on Security for System Administrators

Branson Matheson, Blackphone

Tuesday, November 11, 2014 - 9:00 am-5:00 pm
T2
Defending Against the Dark Arts

Branson Matheson, Blackphone

Invited Talks

Wednesday, November 12, 2014 - 2:00 pm-2:45 pm
Building a One-Time-Password Token Authentication Infrastructure
Jonathan Hanks, LIGO Lab/California Institute of Technology, Abe Singer, Laser Interferometer Gravitational Wave Observatory, Caltech
Wednesday, November 12, 2014 - 2:45 pm-3:30 pm
JEA—A PowerShell Toolkit to Secure a Post-Snowden World
Jeffrey P Snover, Microsoft
Thursday, November 13, 2014 - 11:00 am-12:30 pm
Open Source Identity Management in the Enterprise
Brian J. Atkisson, Red Hat, Inc.
Thursday, November 13, 2014 - 2:00 pm-2:45 pm
Penetration Testing in the Cloud
Dan Lambright, Red Hat
Friday, November 14, 2014 - 11:00 am-11:45 am
Keep it Simple, Stupid: Why the Usual Password Policies Don't Work, and What to Do About It
Abe Singer, Laser Interferometer Gravitational Wave Observatory, Caltech, Warren Anderson, University of Wisconsin, Milwaukee

Mini-Tutorials

Thursday, November 13, 2014 - 4:00 pm-5:30 pm
DNS Response Rate Limiting
Eddy Winstead, ISC
Friday, November 14, 2014 - 2:00 pm-3:30 pm
DON'T PANIC: Managing Incident Response
Abe Singer, Laser Interferometer Gravitational Wave Observatory, Caltech

Panels

Friday, November 14, 2014 - 11:45 am-12:30 pm
Developers and Application Security: Who is Responsible?
Mark Miller, Sonatype

Workshops

Sunday, November 09, 2014 - 9:00 am-5:00 pm
Workshop 2: Security
Piotr T Zbiegiel, Argonne National Laboratory

Gold Sponsors

Silver Sponsors

Bronze Sponsors

General Sponsors

Media Sponsors & Industry Partners

© USENIX

  • Privacy Policy
  • Contact Us

LISA is a registered trademark of the USENIX Association.