You appear to be offline. Some site functionality may not work.

Recap of the Fastly Security Speaker Series

By  Window Snyder, Chief Security Officer, March 3, 2016 in Security

On February 25, we hosted 50+ security researchers and engineers from the Bay Area and beyond in our San Francisco office for the first event in the Fastly Security Speaker Series. This event brought together security engineers and researchers to examine new perspectives around important security topics.

If you’re not in the Bay Area, we'll be live-streaming the next event, and you can watch past events on the Fastly YouTube channel.

Secure Because Math: Challenges on Applying Machine Learning to Security
Alex Pinto, Chief Data Scientist of Niddel and lead of the MLSec Project

Program Synthesis in Reverse Engineering
Rolf Rolles, Möbius Strip Reverse Engineering

Check out our Twitter and our blog over the coming months for more opportunities to participate in upcoming Fastly security events.


You may also like:

Subscribe to our newsletter

Lean Threat Intelligence Part 2: The foundation

In part 1, I discussed the general workflow the Threat Intelligence team at Fastly uses to plan for projects. After performing research and seeing what others have done in this space, we can now move…

How college security competitions help us build great security teams

Building a great team is one of the most difficult challenges security managers encounter. Luckily, there are a few initiatives that make things easier on us, including the Information Security Talent Search (ISTS) at the…

Lean Threat Intelligence, Part 1: The plan

Fastly Security Researcher Zack Allen discusses how you can draw from open source resources to build a lean and powerful Threat Intelligence plan for your organization.


Window Snyder | Chief Security Officer

Window Snyder is Fastly’s Chief Security Officer. She’s been a key contributor to the evolution of security in our connected world, formerly holding positions at Apple, Mozilla Corporation, and Microsoft. She is also the co-author of the book Threat Modeling.