Next
Livestream will start soon!
Livestream has already ended.
Presentation has not been recorded yet!
  • title: Canary in the Datamines: Using Log Canary to find PII
      0:00 / 0:00
      • Report Issue
      • Settings
      • Playlists
      • Bookmarks
      • Subtitles Off
      • Playback rate
      • Quality
      • Settings
      • Debug information
      • Server sl-yoda-v3-stream-012-alpha.b-cdn.net
      • Subtitles size Medium
      • Bookmarks
      • Server
      • sl-yoda-v3-stream-012-alpha.b-cdn.net
      • sl-yoda-v3-stream-012-beta.b-cdn.net
      • 1338956956.rsc.cdn77.org
      • 1656830687.rsc.cdn77.org
      • Subtitles
      • Off
      • English
      • Playback rate
      • Quality
      • Subtitles size
      • Large
      • Medium
      • Small
      • Mode
      • Video Slideshow
      • Audio Slideshow
      • Slideshow
      • Video
      My playlists
        Bookmarks
          00:00:00
            Canary in the Datamines: Using Log Canary to find PII
            • Settings
            • Sync diff
            • Quality
            • Settings
            • Server
            • Quality
            • Server

            Canary in the Datamines: Using Log Canary to find PII

            Nov 5, 2020

            Speakers

            RS

            Ryan Slama

            Speaker · 0 followers

            About

            Why is it that sensitive data always seems to end up places it shouldn't? We won't answer that exact question in this talk, but we *will* tell you about a tool that we wrote to combat the problem. Log Canary is a tool we wrote to continuously probe our product for places where PII might be leaked into logs, so that we can resolve the issue before any real data is written. Join us as we explain the concept of Log Canary and go over lessons we learned in its development and deployment.…

            Organizer

            LMSC
            LMSC

            Loco Moco Security Conference

            Account · 98 followers

            Categories

            Software & Programming

            Category · 1k presentations

            AI & Data Science

            Category · 10.8k presentations

            Web Development & UX/UI

            Category · 1.2k presentations

            About Loco Moco Security Conference

            Inclusive product security conference that attracts builders and defenders from around the world.

            Like the format? Trust SlidesLive to capture your next event!

            Professional recording and live streaming, delivered globally.

            Sharing

            Recommended Videos

            Presentations on similar topic, category or speaker

            How blocking third-party cookies can fix the web's security model
            31:32

            How blocking third-party cookies can fix the web's security model

            Artur Janc, …

            Total of 0 viewers voted for saving the presentation to eternal vault which is 0.0%

            Building effective security OKRs
            33:15

            Building effective security OKRs

            Alex Smolen

            Total of 2 viewers voted for saving the presentation to eternal vault which is 0.2%

            Defending Your Brand With Branded Types
            32:23

            Defending Your Brand With Branded Types

            Colleen Dai

            Total of 0 viewers voted for saving the presentation to eternal vault which is 0.0%

            Survive Your Security Incident 🔪 ...and Thrive Again
            44:15

            Survive Your Security Incident 🔪 ...and Thrive Again

            Coleen Coolidge

            Total of 0 viewers voted for saving the presentation to eternal vault which is 0.0%

            Closing Remarks
            02:46

            Closing Remarks

            Steven Asifo

            Total of 0 viewers voted for saving the presentation to eternal vault which is 0.0%

            Achievement Unlocked: Changing security behaviors with gamification & behavior modification
            36:34

            Achievement Unlocked: Changing security behaviors with gamification & behavior modification

            Kymberlee Price

            Total of 0 viewers voted for saving the presentation to eternal vault which is 0.0%

            Interested in talks like this? Follow Loco Moco Security Conference