Dr
David Crooks
(UKRI STFC)
,
Jouke Roorda
(Nikhef)
, Dr
Sven Gabriel
(Nikhef/EGI)
22/03/2021, 09:00
Oral Presentation
A typical situation security teams encounter is to find out whether they are possibly a victim of an ongoing security incident spreading in, or across infrastructures.
To decide whether your resources are affected by the incident you basically face two problems:
• How to share sensitive information, like Indicators of Compromise (IoCs).
• How to efficiently use the available...
Dr
Daniel Kouril
(Masaryk University)
22/03/2021, 11:00
Oral Presentation
With the uptake of different virtualization technologies also in traditional data processing workflows the security landscape gets increasingly heterogeneous. Container technology allows users and user communities to easily ship complex data processing environments to the federated resources. While using containers adds a lot of flexibility for the resource usage, it also increases the...