Inspired by Justin Garrison, I’m sharing a log of all my CFP submissions.
Slides are available for all given talks over on SpeakerDeck.
2025
You Are Not Netflix: Learning from Conference Talks
Accepted
fwd:cloudsec USA 2025
Conference talks share solutions built for specific contexts—scale, constraints, and resources that likely don’t match yours. This talk teaches how to extract actionable insights while avoiding the trap of cargo-culting Netflix-scale solutions.
Scale Security Programs with Scorecarding
Accepted
OWASP AppSec EU 2025
Security scorecards provide visibility, accountability, and a framework for prioritization. This talk covers how to design, implement, and iterate on scorecarding programs that actually drive security improvements.
2024
Lessons in Security Partnership
Rejected
SecurityFest 2025
As security moves beyond the “Department of No,” partnership has become core for baking security into software. However, security teams are often reinventing and rediscovering partnership skills from scratch. This talk will use personal narratives of effective and ineffective partnerships to teach how to build a proactive and collaborative relationship between Security and its key stakeholders. Learn from my mistakes. Leave this talk empowered and informed with specific tactics to build focus, leverage, and alignment.
Outline
Story 1: A story of bad Security Partnership, told via slack screenshots.
Introduction: Security Partnership
- Engagement Models: Consultative, Embedded, Champions. Proactive, Reactive.
- The stakeholders: Eng ICs, PMs, Eng Leaders, Security
Building a foundation for partnership
- Understand engineering processes
- Understand the product and the business
- Credibility: gained in ounces, lost in pounds
- Relationship: built through proactive partnership
- The role of internal standards
Story 2: Successful partnership - patch management, aligning on timelines and mitigating controls.
Handling Stakeholders: learn to speak their language
- PMs want predictability and clean interfaces
- EMs/TLs want predictability and care about technical requirements
- Eng ICs care about implementation details
The role of standards
- Blind application and inconsistent application both have risks
- Goal: reduce amount of direct partnership (“every consultation is a failure”)
- Hook into existing processes, like design document templates
Communication guidelines
- Communicate with empathy
- Realistic trade-offs
- Vulnerability impact without jargon
- Reward communication with the team
Story 3: Multi-quarter CI/CD security project with stumbles but ultimate success.
Partnering - reactive
- Discovery: build trust and show context
- Setting security requirements and acceptance criteria
- Getting agreement: broad framing, minimize work, center impact on people
- Getting the work done: ownership and sustainability
- Providing feedback: security should bear the burden of false positives
Escalations
- Too many escalations are a sign of dysfunction
- Clean escalations: background, alternatives, tradeoffs in neutral language
How to 10X Your Cloud Security (Without the Series D)
Accepted
fwd:cloudsec EU 2024
I’ll summarize and distill the actionable guidance for scaling Cloud Security programs from the vast array of talks and blog posts out there. We’ll blaze through a dense view of what cloud security is, how you can do it more effectively, and what the near future looks like. After the talk, you’ll have practical takeaways, and a lengthy, curated bibliography to lean on.
Outline
This is a blatant rip off of Clint Gibler’s BSidesSF 2020 talk, but focused on cloud security programs (he’s cool with it!).
Previous related talks:
We’ll cover over a dozen tactics, building on the amazing work in the cloud security community. For example:
- Service allowlisting massively reduces the area you need to control
- Once you have service allowlisting, how do you review new services effectively?
- What can we learn from TrustOnCloud’s threat model approach, Sp0oKeR’s detection engineering, and Wiz’s Cloud Threat Landscape?
The Path to Zero-Touch Production
Accepted
fwd:cloudsec 2024
Zero Touch Prod is a Google-ism, and also a good idea. It’s common that engineers, even at companies with strong security programs and cloud-native architecture, organically evolve operational processes that require they touch production daily.
As security practitioners, it’s our job to keep our companies safe—both from bad actors, and from humans making mistakes. This talk shares my universal theory of how to incrementally and collaboratively move a cloud-native organization to Zero Touch Prod. We’ll talk about why people touch prod, how they touch prod, and what we can do about it.
Outline
Intro (5m)
- You start with SSH to production boxes
- Maybe you move to SSM (no internet exposure) or a bastion host
- Engineers are often touching production for good reason
- Introduce Zero Touch Prod concept
Values behind Zero Touch Production (5m)
- Consider your organization and DevEx
- Values tradeoffs: carrot or stick, paved roads or goat paths, early launch timing
Taxonomy of production access needs (5m)
- Script running - predefined commands with safe arguments
- Scheduled Jobs - async, recurring, backfills
- UI-based Internal Tools
- Workbench with production data framework
- Read-only access to safe production data subset
- Break-glass JIT/Temporal Access
AWS Primitives & Vendor options (10m)
- Port Forwarding, RDS IAM auth, RunCommand as script runner
- AWS Verified Access, Cloudflare Access, Okta ASA, ZTNA tools
- JIT Access synthesis
Case Studies in DevEx (5m)
- Browser extension for Identity Center sessions
- Single opinionated CLI flow (aws-vault, granted)
- Wrapping CLIs for smart role selection, JIT integration, error guidance
- Single CLI for production access hiding SSM vs EC2 Instance Connect complexity
2023
Beyond the Baseline: Horizons for Cloud Security Programs
Accepted
SEC-T OxOF (2023)
There is a definitive resource for cloud-native companies to build a security program and posture in AWS: Scott Piper’s AWS Security Maturity Roadmap. However, mature programs quickly progress past the end of Scott’s roadmap. This talk takes you on a rapid fire tour beyond the roadmap, focusing on the problems you’ll encounter scaling a cloud security program.
Outline
Context (12m)
- Biases: engineering oriented security program, zero trust, selling a software product
- The baseline via Scott’s Cloud Security Maturity roadmap
- The Netflix influence: “Netflix exists in order to spite the gods, copy them not”
- Build v. Buy framework from Sabry Tozin
Meat (25m)
Problem space and solutions for:
- Asset inventory / continuous compliance
- Secrets Management
- Secure IAC modules
- SSH replacement
- Least Privilege / IAM
- Account management, vending, and sandbox accounts
- DFIR
- Automated remediation
- Runtime Security
- Endpoint Monitoring
- Egress / Perimeter (data, network)
- Honeytokens
Beyond the AWS Security Maturity Roadmap
Accepted
fwd:cloudsec 2023
Scott’s AWS Security Maturity Roadmap is the definitive resource for cloud-native companies to build a security program in AWS. However, for many fwd:cloudsec attendees the roadmap ends too soon. This talk takes you on a rapid fire tour beyond the paved road, comparing approaches and avoiding the trap of undifferentiated work.
Outline
Context (6m)
- Biases on “the sort of cloud security program” I’m talking about
- The Netflix influence
- When I joined Figma: “we’ve shipped the roadmap, help us figure out what’s next”
- Build v. Buy framework
Meat (14m)
Specific OSS and commercial solutions for:
- Asset inventory / continuous compliance
- Secrets Management
- Secure IAC modules
- SSH replacement
- Least Privilege / IAM
- Account management and sandbox accounts
- DFIR
- Automated remediation
- Runtime Security
- Endpoint Monitoring
- Egress / Perimeter
- Honeytokens
Level Up Your Career: A Panel on Staff+ Engineering
Accepted
BSidesSF 2023
What does it mean to be a Staff+ engineer in security, and how can you get there? Come hear our panelists discuss what it’s really like, how you go from Senior to Staff, or whatever you want to learn more about.
Outline
This panel gathers participants from the tldrsec Staff+ Engineering guide.
Format:
- 90 second introductions from each panelist
- Pre-seeded questions to start discussion
- Open floor for audience questions
Sample questions:
- What’s a week like as a Staff+ engineer?
- What are the hardest parts of being a Staff+ engineer?
- What should you do if you feel “stuck” at Senior?
- What about your Staff+ journey is specific to Security?
- Is there an IC/Manager Pendulum in Security?
- What comes after Staff+ for you?
2022
Buying Security: A Client’s Guide
Accepted
BSidesSF 2022
You can’t buy security, but vendors play a key role in effective security programs. This talk provides a comprehensive guide to buying and getting value, based on experiences on both sides of the marketplace, a comprehensive literature review, and a survey of clients and vendors of all stripes.
Outline
Why this talk?
- Vendor agnostic (⅔ of sources reviewed were vendor blogs)
- Built on comprehensive literature review (PTES, Gartner, CREST, NCSC)
- Includes survey data from TL;DR Sec’s 8,000+ community
Outline:
- Types of Security Services
- Common motivations: Compliance, Sales, Investment/M&A, internal attestation, post-breach, risk reduction
- Types of Vendors: Enterprise consulting, boutique, specialty, sole practitioner, MSSP, VAR
- How to find vendors: Network, research, conference speakers, published research, certifications
- Client-side scoping and requirements
- Requesting and reviewing proposals (RFP process)
- Contracting: Quotes, negotiation, vetting, rules of engagement
- Pre-assessment preparation
- After the assessment: Readout, reading reports, ingesting results
- What comes next
Steal this Security Program
Rejected
ShmooCon 2022
Bezos coined “undifferentiated heavy lifting” in 2006. Security is an industry mired in the muck. Much of this work is common and has been solved many times before. This talk separates signal from noise and highlights the best public resources you can use to build your security program.
Outline
Operating principles:
- This is a maturity shortcut
- Focus on separating signal from noise
- Only bring things into your program that you understand
- Identify a need → fill it
Resources covered:
- Training: PagerDuty’s sudo, PortSwigger Web Security Academy, Security Champions Playbook
- Incident management: PagerDuty response guide, Etsy’s blameless postmortems
- Risk Assessment: Mozilla’s Rapid Risk Assessment, Google’s VSA process
- Vulnerability Reporting: Disclose.io, Bug Bounty COI
- Compliance: Adobe CCF, GDPR Checklist, JupiterOne policy templates
- Hiring: Interview question collections
- Full programs: GitLab handbook, 18F engineering security
2021
Cloud Security Orienteering
Accepted
DEF CON Cloud Village 2021
Most of us are not lucky enough to have architected the perfect cloud environment. Over the course of a career in cloud security, you’ll likely find yourself walking into a new environment and needing to rapidly orient yourself to mitigate risks and develop a sustainable roadmap.
This talk presents a cloud and environment agnostic methodology for getting your bearings when tasked with securing a novel cloud environment.
Full outline: tldrsec.com/p/blog-cloud-security-orienteering
2020
Learning from AWS (Customer) Security Incidents
Accepted
BSidesCT 2020
With a focus on AWS, this talk discusses over a dozen different public breaches. We walk through the technical details, establish common root causes, and establish how you can proactively secure your environment against these real world risks.
Outline
Prior art:
- SANS Cloud Security Summit talks
- fwd:cloudsec “The Usual Suspects”
- F5 breach highlights
Case Studies:
- Exposed S3 buckets, managed Elasticsearch
- CapitalOne
- Code Spaces
- DNC Hack (GRU)
- LA Times, OneLogin, Uber, Imperva, Tesla
- JW Player, TeamTNT botnet, Cryptomining AMI
Root Causes:
Correlate breaches and establish common root causes, comparing to MITRE ATT&CK Cloud matrix.
AWS Security: Easy Wins and Enterprise Scale
Accepted
BSidesBOS 2020
Whether your organization has two feet in the cloud, is dipping a toe, or you’re wondering “where do I even start,” this talk covers both extremes: easy wins anyone can apply, and big picture problems to consider as your security maturity or AWS usage grows.
Outline
Introduction (10m)
- The Cloud, AWS, Shared Responsibility Model
- Key background: VPCs, EC2, security groups, NACLs
- IAM: Principal Types, Credentials, Policies, Policy Evaluation
Easy (15-20m)
- Single account best practices and security services
- Common account compromise footholds
- Single account auditing
- Turnkey encryption
Hard (15-20m)
- Organizational Architecture
- Security at scale
- Encryption and Least Privilege
- Logging/Monitoring/Alerting
- Preparing for Incident Response
- Visibility and multi-account auditing
- Governance: IaC, AWS Config, SCPs
- Automatic Remediation
2019
- Building Castles in the Cloud: AWS Security and Self-Assessment — BSidesCT 2019 (Accepted)
- AWS Cloud Security Fundamentals (4-hour workshop) — OWASP BASC 2019 (Accepted)