Event Schedule

Welcome Note
  • 15:00 - 15:09
  • Nullcon
  • Zoom

Welcome Note

Talk
MySQL Query Tuning - Indexes versus Histograms
  • 15:10 - 15:50
  • David Stokes
  • Zoom

MySQL Query Tuning - Indexes versus Histograms

Database query tuning is seen by many as a mystery. They may add an index or many and then are surprised to find things run S-L-O-W-er.

Talk
Design principles to Strengthen Security of your AWS Cloud Workload
  • 15:50 - 16:30
  • Rohini Gaonkar
  • Zoom

Design principles to Strengthen Security of your AWS Cloud Workload

The AWS Well-Architected Framework describes the key concepts, design principles, and architectural best practices

Workshop
Adding AI enrichment to your data with Azure Cognitive search​
  • 16:30 - 18:00
  • Priyanka Shah
  • Zoom

Adding AI enrichment to your data with Azure Cognitive search​

Azure Cognitive search is a cloud search service that enables developers to build a rich search experience over heterogeneous content like text, images, multimedia content.

Talk
How to Find and Fix Container Image Vulnerabilities with Docker

How to Find and Fix Container Image Vulnerabilities with Docker

In today's day and age, security is of the utmost importance when developing software. Containers are becoming more and more prevalent in how we build and deliver our software applications.

Talk
Image Classification using AI/ML models
  • 15:50 - 16:40
  • Meenakshi Kaushik and Sergio Fiszman
  • Zoom

Image Classification using AI/ML models

This session will walk through how to create a simple image classification example from scratch.

Workshop
Building a security platform using Elastic Stack
  • 16:30 - 18:00
  • Aravind Putrevu & Ravindra Ramnani
  • Zoom

Building a security platform using Elastic Stack

What if I say you don't need to go for a coffee when you are running a query against a threat hunting too

  • TBA
  • TBA
  • TBA

TBA

TBA

  • TBA
  • TBA
  • TBA

TBA

TBA

Secure IoT product development with an understanding of the attacker's perspective
  • 11:50 - 12:30
  • Asmita Jha
  • Zoom

Secure IoT product development with an understanding of the attacker's perspective

No wonder, the IoT devices around us have grown by many folds in different domains. Along with the development of these IoT products, its security is in our hands too to some extent.

  • TBA
  • Zoom

TBA

Talk
Govern your Machine Learning Models
  • 11:10 - 12:00
  • Pulkit Agarwal
  • Zoom

Govern your Machine Learning Models

Are you responsible for your company's IT infrastructure but aren't quite sure what’s in production or who has access ?

Talk
Reinforcement Learning: Advances, Applications & Challenges
  • 11:50 - 12:30
  • Dr. Ankur Narang
  • Zoom

Reinforcement Learning: Advances, Applications & Challenges

Reinforcement Learning (RL) is an interesting and challenging area of semi-supervised machine learning that has a wide variety of applications including games, personalized recommendation, bidding and advertising, robotics, traffic light control and many others.

Workshop
Computer Vision with Amazon SageMaker
  • 12:50 - 14:00
  • Suman Debnath
  • Zoom

Computer Vision with Amazon SageMaker

In this hands-on session, we are going to explore what is Amazon SageMaker and what it offers for Deep Learning engineers, specifically who are working on Computer Vision.