| DevOps in Regulatory Spaces: It's Only 25% What You Thought It Was… | LISA17 | Peter Lega |
| Capacity and Stability Patterns | LISA17 | Brian Pitts |
| Clarifying Zero Trust: The Model, the Philosophy, the Ethos | LISA17 | Evan Gilman, Doug Barth |
| Pintrace: A Distributed Tracing Pipeline | LISA17 | Suman Karumuri |
| Coherent Communications—What We Can Learn from Theoretical Physics | LISA17 | Kevin Barron |
| An Internet of Governments: How Policymakers Became Interested in “Cyber” | LISA17 | Maarten Van Horenbeeck |
| Scaling Talent: Attracting and Retaining a Diverse Workforce | LISA17 | |
| Vax to K8s: Ticketmaster's Transformation to Cloud Native Devops | LISA17 | Heather Osborn |
| The Actor Model and the Queue or “Batch is the New Black” | LISA17 | James Whitehead II |
| Linux Container Performance Analysis | LISA17 | Brendan Gregg |
| Now You See Me Too: Visual Tooling for Advanced System Analysis | LISA17 | Suchakrapani Sharma |
| Your Secrets in Cloud-Based Key Management Services | LISA17 | Dan O'Boyle |
| Resiliency Testing with Toxiproxy | LISA17 | Jake Pittis |
| Fast Log Analysis Made Easy by Automatically Parsing Heterogeneous Logs | LISA17 | Biplob Debnath, Will Dennis |
| Stories from the Trenches of Government Technology | LISA17 | Matt Cutts, Raquel Romano |
| Case Study: Deploying a Multi-Region, Highly Available MySQL Architecture | LISA17 | Gabriel Ciciliani |
| Operational Compliance: From Requirements to Reality | LISA17 | Trevor Vaughan |
| Charliecloud: Unprivileged Containers for User-Defined Software Stacks in HPC | LISA17 | Michael Jennings |
| Fast and Safe Production Monitoring of JVM Applications with BPF Magic | LISA17 | Sasha Goldshtein |
| Disaggregating the Network: Switching as a Service | LISA17 | Nina Schiff |
| Persistent SRE Antipatterns: Pitfalls on the Road to Creating a Successful SRE Program Like Netflix and Google | LISA17 | Blake Bisset, Jonah Horowitz |
| Have You Tried Turning It Off and Turning It On Again? | LISA17 | Tanya Reilly |
| Becoming a Plumber: Building Deployment Pipelines | LISA17 | Daniel Barker |
| The 7 Deadly Sins of Documentation | LISA17 | Chastity Blackwell |
| Distributed Tracing: From Theory to Practice | LISA17 | Stella Cotton |