Watch all of the sessions of the in-person Teleport Connect 2023 from the convenience of your home, and more!
In October 2023, the second Teleport Connect gathered leading technologists in San Francisco, CA to further the education and advancement of infrastructure access and deploying secure systems at scale. It was an impactful event full of content and cross-pollination of ideas, so why not make it accessible to all?
We're bringing you this virtual experience to engage with users once again and spark brand new conversations, whether you attended in-person or are joining us for the first time.
Save your (virtual!) spot by filling out the form above and get exclusive access to access three live and 17 more on-demand infrastructure access content sessions.Keynote: People, Process, and TechnologyJason Loomis - CISO @ Freshworks | |
Keynote: Identity-Native Infrastructure AccessEv Kontsevoy - CEO @ Teleport | |
When the Datacenter Melts Down, Our Developers Won'tEddie Wassef - VP, Chief Architect @ Vonage | |
Teleport IdentityXin Ding - VP of Product Management @ Teleport | |
Panel: From Risks to Ramped-Up SecurityModerated by: Reed Loden, VP of Security @ Teleport. Guests: Balachandra Shanabhag - Staff Security Engineer @ Cohesity, Filipe Felisbino - Architect @ Udemy | |
The Roadmap to DevSecOps AdoptionAnkita Gupta - Co-founder and CEO @ Akto.io | |
Securing AI Infrastructure Using TeleportSako M - Sr. Software Engineer @ Gladly | |
Access Control Live: Access Evolution: Orange Book to Identity-NativeHost: Ben Arent - Director of DevRel @ Teleport. Guest: Ev Kontsevoy - CEO @ Teleport | |
Getting Ready for the Big Day: Preparing your SIEM For Analyzing TeleportHunter Madison - CISO @ IBM | |
How Advisors Use Teleport to Meet FedRAMP ComplianceBhanu Jagasia - Chief Technology Samurai @ bladestack.io | |
Running Global Scale Physical & Kubernetes Infrastructure with Teleport On-PremMohammed Naser - Founder & CEO @ VEXXHOST | |
Machine ID: A whistle-stop tour!Noah Stride - Software Engineer @ Teleport | |
Protecting Okta Applications and Groups using TeleportMike Wilson - Software Engineer @ Teleport | |
Achieving Access Management Best Practices with TeleportNivathan Somasundharam - Implementation Engineer @ Teleport | |
Natural Language as the Next User InterfaceJakub Nyckowski - Softare Engineering Manager @ Teleport | |
Providing Highly Available Teleport with Teleport CloudStephen Levine - Software Engineer @ Teleport | |
Automating Access: Teleport as Part of Your IAC StrategyDan Kirkwood - Solutions Engineer @ Teleport | |
What's coming in 2024?Sasha Klizhentas - CTO @ Teleport |
Talk: This talk provides a comprehensive roadmap to adopting DevSecOps, highlighting the importance of infusing security practices right from the ideation stage through to deployment. Key takeaways: 1. Awareness and Education 2. Cultural Shift 3. Assess Current Security Posture 4. Integrate Security into Development 5. Integrate Security into CI/CD Pipeline 6. Secure the Infrastructure 7. Integrate Security into Deployment 8. Continuous Monitoring and Feedback 9. Measurement and Reporting...
Panel: From Risks to Ramped-Up Security....
Podcast: Access Control Live, a podcast about all things access control. In this episode, we'll discuss the evolution of access control from the Orange Book to Identity-Native with Ev Kontsevoy, CEO of Teleport....
Talk: The presentation will touch on how we at bladestack.io use Teleport as part of our technology stack for our bladeRAMP offering. The discussion will touch on how Teleport supports both customers and Samurais (BSIO Employees) in ConMon activities and managing the secure environment....
Talk: Automating Access: Teleport as part of your IAC strategy...
Talk: A multi-region, active-active deployment with Kubernetes Operators powered by GitOps keeps our Teleport installation humming....
Keynote: Scaling Infrastructure Access from Teleport CEO....
Panel: From Risks to Ramped-Up Security....
Talk: Now that you've migrated your access to Teleport, are you prepared to analyze the data from Teleport to resolve a cybersecurity incident? In this talk, we will look at analyzing Teleport's logs from the standpoint of a cybersecurity analyst across a set of synthetic cases to uncover what can go wrong during the analysis process. We will look at a set of common analysis patters backed by a suite of open source that can improve your organization's agility and response times when trying to investigate a cybersecurity problem....
Talk: Natural language as the next User Interface...
Keynote: People, process, and technology: A Case Study Approach to Cybersecurity Leadership How I build high-functioning cybersecurity teams. Cybersecurity often focuses on the wrong things. Jason Loomis, Chief Information Security Officer of Freshworks, will discuss how he focuses on team decision-making to build high-functioning cybersecurity teams. Using a case study approach, he’ll share three stories, two dysfunctions, and ten takeaways to maybe, just maybe, help you improve the people, in people, process, and technology....
Talk/Workshop: How would you add magic to Teleport? What would you change? What would you add? Join us for a collaborative workshop where we envision many different possibilities for Teleport....
Talk: The new Okta service in Teleport Enterprise allows users to protect Okta using Teleport's fine grained RBAC. We'll delve into how this works and what it took to implement this feature....
Talk: With 3 public cloud regions and many other private clouds (in many different datacenters all over the world), learn more about how VEXXHOST uses Teleport to manage access to all these systems and addressing about many advantages and challenges we've seen, such as managing identity, geo-redundant Teleport clusters, running over Tailscale, automating deployment and how we've managed to fully get rid of SSH keys....
Talk: Achieving Access Management best practices with Teleport...
Talk: A whistle stop tour of Machine ID that answers questions like: - What is Machine ID? - Why Machine ID? - Who is/isn't Machine ID for? (common usecases and strengths/weaknesses) - Depending on time: perhaps a short functional example of a GitHub Action or similar. - What's coming next for Machine ID?...
Panel: From Risks to Ramped-Up Security....
Talk: Unleashing Teleport: Uncover Five Underutilized Features to Enhance Speed and Security...
Talk: Sasha will present two futuristic projects currently in works by Teleport Engineering that are coming in 2024....
Talk: Teleport Cloud offers Teleport as a globally available, highly available SaaS with a 99.9% uptime SLA. This session presentation covers the architecture of Teleport Cloud, which may help Teleport users improve their own on-prem deployments, or alternatively, decide that Cloud best fits their use cases. The presenter, Stephen Levine, leads the Teleport Cloud backend team....
Talk: Teleport Identity, an overview of how Teleport can help....
Our conference is dedicated to providing a harassment-free conference experience for everyone, regardless of gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion (or lack thereof), or technology choices. We do not tolerate harassment of conference participants in any form. Sexual language and imagery is not appropriate for any conference venue, including talks, workshops, parties, Twitter, and other online media. Conference participants violating these rules may be sanctioned or expelled from the conference without a refund at the discretion of the conference organizers
Harassment includes offensive verbal comments related to gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion, technology choices, sexual images in public spaces, deliberate intimidation, stalking, following, harassing photography or recording, sustained disruption of talks or other events, inappropriate physical contact, and unwelcome sexual attention. Participants asked to stop any harassing behavior are expected to comply immediately.
If a participant engages in harassing behavior, the conference organizers may take any action they deem appropriate, including warning the offender or expulsion from the conference with no refund.
If you are being harassed, notice that someone else is being harassed, or have any other concerns, please contact a member of conference staff immediately.
Conference staff can be identified by distinct staff badges. Conference staff will be happy to help participants contact venue security or local law enforcement, provide escorts, or otherwise assist those experiencing harassment to feel safe for the duration of the conference. We value your attendance.
We expect participants to follow these rules at conference and conference-related social events.