Conf42 Python Returns in 2022

The conference announced more than 20 talks prepared and mentored by international Pythonistas.

The conference starts on the 27th of January. This year the conference presents more than 20 speeches: Getting Started with Azure Health Bot, Using Reproducible Experiments To Create Better Machine Learning Models, Strategies for working with data as it grows, Python-Based Data Science Scaled Up for Humanitarian Good, COVID-19 is a cloud security catalyst, Why attackers in Code packages are getting a Pass, and more. 

Among the speakers you will hear from: 

  • Rain Leander, Developer Advocate, at Cockroach Labs: Regress to Progress: A Child’s Mindset for Growth.

'On the road to becoming a unicorn, you need to go backward to make progress. As we get older, we forget how to fall down, how to play, how to explore and be curious - and these are necessary skills to becoming the best unicorn you can be. Most recently I’m diving into two new technologies - distributed databases and javascript and I invite you to join me and my inner child, who really wants to be a unicorn, as we explore rainbows, build mountains, and tear it all down again with joy, curiosity, and eagerness. I will provide specific examples, from using editors to troubleshooting issues, and conclude with practical recommendations on getting started, becoming a unicorn, and conquering the world.', says Rain Leander.

  • David Melamed, Co-Founder, and CTO at JIT: Minimum Viable Security for Python Applications

In this talk the speaker will focus on five critical security controls that will be integrated as part of the CI/CD pipeline: Bandit for static application security (SAST), Gitleaks to detect hard-coded or insufficiently secured secrets, Python dependency checks (SCA), infrastructure as code (IaC) and ZAP for API and dynamic application security (DAST), in addition to custom controls to ensure proper enforcement of MFA via Github Security. These controls will provide a foundational framework for securing Python applications, from the first line of code, that will make it possible to continuously iterate and evolve the security maturity, for advanced layers of security that often come with time, as well as increased experience. Code examples will be showcased as part of this session.

  • Filipi Pires, Cyber Security Evangelist at SENHASEGURA: Malware Hunting - Using python as attack weapon.

The purpose of this presentation is to use python scripts to perform some tests of efficiency and detection in various endpoint solutions, during the demonstration the speaker will show a defensive security analysis with an offensive mind performing the execution of some python scripts responsible for downloading some malware in Lab environment. 

'The first objective will be to simulate targeted attacks using a python script to obtain a panoramic view of the resilience presented by the solution, with regard to the efficiency in its detection by signatures, NGAV, and Machine Learning, running this script, the idea is to download these artifacts directly on the victim’s machine. The second objective is to run more than one python script with daily malware, made available by MalwaresBazaar upon request via API access, downloading daily batches of malware.', adds Filipi. 

You may learn more about the conference here

Join discussion

Comments 0

    You might also like

    We need your consent

    We use cookies on this website to make your browsing experience better. By using the site you agree to our use of cookies.Learn more