Teleport Workload Identity with SPIFFE: Achieving Zero Trust in Modern Infrastructure
May 23
Virtual
Register Today
Teleport logoTry For Free
Background image

Fill out the form to unlock all of the content sessions on infrastructure access management from Teleport Connect 2023 from industry professionals at Freshworks, IBM, VEXXHOST, and more.

PAM the robot waving

Watch Connect Virtual Sessions On-Demand

Watch all of the sessions of the in-person Teleport Connect 2023 from the convenience of your home, and more!

Why Tune In?

In October 2023, the second Teleport Connect gathered leading technologists in San Francisco, CA to further the education and advancement of infrastructure access and deploying secure systems at scale. It was an impactful event full of content and cross-pollination of ideas, so why not make it accessible to all?

We're bringing you this virtual experience to engage with users once again and spark brand new conversations, whether you attended in-person or are joining us for the first time.

Save your (virtual!) spot by filling out the form above and get exclusive access to access three live and 17 more on-demand infrastructure access content sessions.
Photo of audience at Teleport Connect 2023 with Jason Loomis speaking
Photo of speaker Sasha CTO from Teleport talking
Access Control Podcast Live at Teleport Connect 2023
Background image

Available On-Demand

Keynote: People, Process, and Technology

Jason Loomis - CISO @ Freshworks

Keynote: Identity-Native Infrastructure Access

Ev Kontsevoy - CEO @ Teleport

When the Datacenter Melts Down, Our Developers Won't

Eddie Wassef - VP, Chief Architect @ Vonage

Teleport Identity

Xin Ding - VP of Product Management @ Teleport

Panel: From Risks to Ramped-Up Security

Moderated by: Reed Loden, VP of Security @ Teleport. Guests: Balachandra Shanabhag - Staff Security Engineer @ Cohesity, Filipe Felisbino - Architect @ Udemy

The Roadmap to DevSecOps Adoption

Ankita Gupta - Co-founder and CEO @ Akto.io

Securing AI Infrastructure Using Teleport

Sako M - Sr. Software Engineer @ Gladly

Access Control Live: Access Evolution: Orange Book to Identity-Native

Host: Ben Arent - Director of DevRel @ Teleport. Guest: Ev Kontsevoy - CEO @ Teleport

Getting Ready for the Big Day: Preparing your SIEM For Analyzing Teleport

Hunter Madison - CISO @ IBM

How Advisors Use Teleport to Meet FedRAMP Compliance

Bhanu Jagasia - Chief Technology Samurai @ bladestack.io

Running Global Scale Physical & Kubernetes Infrastructure with Teleport On-Prem

Mohammed Naser - Founder & CEO @ VEXXHOST

Machine ID: A whistle-stop tour!

Noah Stride - Software Engineer @ Teleport

Protecting Okta Applications and Groups using Teleport

Mike Wilson - Software Engineer @ Teleport

Achieving Access Management Best Practices with Teleport

Nivathan Somasundharam - Implementation Engineer @ Teleport

Natural Language as the Next User Interface

Jakub Nyckowski - Softare Engineering Manager @ Teleport

Providing Highly Available Teleport with Teleport Cloud

Stephen Levine - Software Engineer @ Teleport

Automating Access: Teleport as Part of Your IAC Strategy

Dan Kirkwood - Solutions Engineer @ Teleport

What's coming in 2024?

Sasha Klizhentas - CTO @ Teleport

Our Speakers

Ankita Gupta (she/her)

The Roadmap to DevSecOps Adoption

Ankita Gupta (she/her)

Akto.io

Talk: This talk provides a comprehensive roadmap to adopting DevSecOps, highlighting the importance of infusing security practices right from the ideation stage through to deployment. Key takeaways: 1. Awareness and Education 2. Cultural Shift 3. Assess Current Security Posture 4. Integrate Security into Development 5. Integrate Security into CI/CD Pipeline 6. Secure the Infrastructure 7. Integrate Security into Deployment 8. Continuous Monitoring and Feedback 9. Measurement and Reporting...

Balachandra Shanabhag (he/him)

Panel: From Risks to Ramped-Up Security: Panelist

Balachandra Shanabhag (he/him)

Cohesity

Panel: From Risks to Ramped-Up Security....

Ben Arent (he/him)

Access Control Live: Access Evolution. Orange Book to Identity-Native

Ben Arent (he/him)

Teleport

Podcast: Access Control Live, a podcast about all things access control. In this episode, we'll discuss the evolution of access control from the Orange Book to Identity-Native with Ev Kontsevoy, CEO of Teleport....

Bhanu Jagasia (he/him)

How Advisors Use Teleport to meet FedRAMP Compliance

Bhanu Jagasia (he/him)

bladestack.io

Talk: The presentation will touch on how we at bladestack.io use Teleport as part of our technology stack for our bladeRAMP offering. The discussion will touch on how Teleport supports both customers and Samurais (BSIO Employees) in ConMon activities and managing the secure environment....

Dan Kirkwood (he/him)

Automating Access: Teleport as part of your IAC strategy

Dan Kirkwood (he/him)

Teleport

Talk: Automating Access: Teleport as part of your IAC strategy...

Eddie Wassef (he/him)

When the Datacenter Melts Down, Our Developers Won't

Eddie Wassef (he/him)

Vonage

Talk: A multi-region, active-active deployment with Kubernetes Operators powered by GitOps keeps our Teleport installation humming....

Ev Kontsevoy (he/him)

Identity-Native Infrastructure Access

Ev Kontsevoy (he/him)

Teleport

Keynote: Scaling Infrastructure Access from Teleport CEO....

Filipe Felisbino (he/him)

Panel: From Risks to Ramped-Up Security: Panelist

Filipe Felisbino (he/him)

Udemy

Panel: From Risks to Ramped-Up Security....

Hunter Madison (he/him)

Getting Ready for the Big Day: Preparing your SIEM For Analyzing Teleport

Hunter Madison (he/him)

IBM CISO

Talk: Now that you've migrated your access to Teleport, are you prepared to analyze the data from Teleport to resolve a cybersecurity incident? In this talk, we will look at analyzing Teleport's logs from the standpoint of a cybersecurity analyst across a set of synthetic cases to uncover what can go wrong during the analysis process. We will look at a set of common analysis patters backed by a suite of open source that can improve your organization's agility and response times when trying to investigate a cybersecurity problem....

Jakub Nyckowski (he/him)

Natural language as the next User Interface

Jakub Nyckowski (he/him)

Teleport

Talk: Natural language as the next User Interface...

Jason Loomis (he/him)

People,

process, and technology.

Jason Loomis (he/him)

Freshworks

Keynote: People, process, and technology: A Case Study Approach to Cybersecurity Leadership How I build high-functioning cybersecurity teams. Cybersecurity often focuses on the wrong things. Jason Loomis, Chief Information Security Officer of Freshworks, will discuss how he focuses on team decision-making to build high-functioning cybersecurity teams. Using a case study approach, he’ll share three stories, two dysfunctions, and ten takeaways to maybe, just maybe, help you improve the people, in people, process, and technology....

Kenneth Roraback (he/him)

Making Teleport Magical

Kenneth Roraback (he/him)

Teleport

Talk/Workshop: How would you add magic to Teleport? What would you change? What would you add? Join us for a collaborative workshop where we envision many different possibilities for Teleport....

Mike Wilson (he/him)

Protecting Okta Applications and Groups using Teleport

Mike Wilson (he/him)

Teleport

Talk: The new Okta service in Teleport Enterprise allows users to protect Okta using Teleport's fine grained RBAC. We'll delve into how this works and what it took to implement this feature....

Mohammed Naser (he/him)

Running global scale physical & Kubernetes infrastructure with Teleport on-premise

Mohammed Naser (he/him)

VEXXHOST, Inc.

Talk: With 3 public cloud regions and many other private clouds (in many different datacenters all over the world), learn more about how VEXXHOST uses Teleport to manage access to all these systems and addressing about many advantages and challenges we've seen, such as managing identity, geo-redundant Teleport clusters, running over Tailscale, automating deployment and how we've managed to fully get rid of SSH keys....

Nivathan Athiganoor Somasundharam (he/him)

Achieving Access Management best practices with Teleport

Nivathan Athiganoor Somasundharam (he/him)

Teleport

Talk: Achieving Access Management best practices with Teleport...

Noah Stride (he/they)

Machine ID: A whistle-stop tour!

Noah Stride (he/they)

Teleport

Talk: A whistle stop tour of Machine ID that answers questions like: - What is Machine ID? - Why Machine ID? - Who is/isn't Machine ID for? (common usecases and strengths/weaknesses) - Depending on time: perhaps a short functional example of a GitHub Action or similar. - What's coming next for Machine ID?...

Reed Loden (he/him)

Panel: From Risks to Ramped-Up Security: Moderator

Reed Loden (he/him)

Teleport

Panel: From Risks to Ramped-Up Security....

Sako M (he/him)

Securing AI infrastructure using Teleport

Sako M (he/him)

Gladly

Talk: Unleashing Teleport: Uncover Five Underutilized Features to Enhance Speed and Security...

Sasha Klizhentas (he/him)

What's coming in 2024?

Sasha Klizhentas (he/him)

Teleport

Talk: Sasha will present two futuristic projects currently in works by Teleport Engineering that are coming in 2024....

Stephen Levine (he/him)

Providing Highly Available Teleport with Teleport Cloud

Stephen Levine (he/him)

Teleport

Talk: Teleport Cloud offers Teleport as a globally available, highly available SaaS with a 99.9% uptime SLA. This session presentation covers the architecture of Teleport Cloud, which may help Teleport users improve their own on-prem deployments, or alternatively, decide that Cloud best fits their use cases. The presenter, Stephen Levine, leads the Teleport Cloud backend team....

Xin Ding (he/him)

Teleport Identity

Xin Ding (he/him)

Teleport

Talk: Teleport Identity, an overview of how Teleport can help....

Code of Conduct

Our conference is dedicated to providing a harassment-free conference experience for everyone, regardless of gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion (or lack thereof), or technology choices. We do not tolerate harassment of conference participants in any form. Sexual language and imagery is not appropriate for any conference venue, including talks, workshops, parties, Twitter, and other online media. Conference participants violating these rules may be sanctioned or expelled from the conference without a refund at the discretion of the conference organizers

Harassment includes offensive verbal comments related to gender, gender identity and expression, age, sexual orientation, disability, physical appearance, body size, race, ethnicity, religion, technology choices, sexual images in public spaces, deliberate intimidation, stalking, following, harassing photography or recording, sustained disruption of talks or other events, inappropriate physical contact, and unwelcome sexual attention. Participants asked to stop any harassing behavior are expected to comply immediately.

If a participant engages in harassing behavior, the conference organizers may take any action they deem appropriate, including warning the offender or expulsion from the conference with no refund.

If you are being harassed, notice that someone else is being harassed, or have any other concerns, please contact a member of conference staff immediately.

Conference staff can be identified by distinct staff badges. Conference staff will be happy to help participants contact venue security or local law enforcement, provide escorts, or otherwise assist those experiencing harassment to feel safe for the duration of the conference. We value your attendance.

We expect participants to follow these rules at conference and conference-related social events.