##About Rootconf 2018 and who should attend:
Rootconf is India’s best conference on DevOps, SRE and IT infrastructure. Rootconf attracts systems and operations engineers to share real-world knowledge about building reliable systems.
The 2018 edition is a single track conference. Day 1 – 10 May – features talks on security. Colin Charles (chief evangelist at Percona Foundation), Pukhraj Singh (former national cybersecurity manager at UIDAI), Shamim Reza (open source enthusiast), Alisha Gurung (network engineer at Bhutan Telecom) and Derick Thomas (former network engineer at VSNL and Airtel Bharti) will touch on important aspects of infrastructure, database, network and enterprise security.
Day 2 – 11 May – is filled with case studies and stories about legacy code, immutable infrastructure, root-cause analysis, handling dependencies and monitoring. Talks from Exotel, Kayako, Intuit, Helpshift, Digital Ocean, among others, will help you evaluate DevOps tools and architecture patterns.
If you are a:
- DevOps programmer
- Systems engineer
- VP of engineering
- IT manager
you should attend Rootconf.
- DevSec Ops
- Microservices - tooling, architecture, costs and culture
- Mistakes that startups make when planning infrastructure
- Handling technical debt
- How to plan a container strategy for your organization
- Evaluating AWS for scale
- Future of DevOps
Rootconf is a conference for practitioners, by practitioners.
The call for proposals is closed. If you are interested in speaking at Rootconf events in 2018, submit a proposal here: rootconf.talkfunnel.com/rootconf-round-the-year-2018/
NIMHANS Convention Centre, Lakkasandra, Hombegowda Nagar, Bengaluru, Karnataka 560029.
For more information about Rootconf, sponsorships, outstation events, contact email@example.com or call 7676332020.
How to do better systems security
The presentaion is to mainly create awareness among engineers or any one in the field Information Technology to think about security before implementing anything and considering the worst case scenerios and the risks involved. It’s also about how can we make a security plan and how do we overcome a securty attack in the most simplest way.
- Assest & threats
- Threat Models
- Mail, Web and DNS Security
- Logging and Monitoring
- Some real life examples.
Any technical staffs as security is must for one and all.
I started my journey as a Network Engineer and worked for some time and then came
into systems. I was previously with the private Telecom and now with
Bhutan Telecom. During that process i received fellowship to Apricot
2015 and the i went as a trainer to Network and systems security to
APRICOT 2016. Going as an attendee and then going as a trainer to the
same event has been an exciting one and hope that encourages the other
participants.I also actively participate in BTNOGs held in the country
as and when possible. I have also signed .bt after joining the company
and then implemented dnssec. I have been in this industry for 7 years now.