7 November 2019 | Krakow Multikino
7 November 2019
Krakow Multikino
The Akamai Affinity Tech Talks is a conference that broaches the most important subjects of the current technology landscape. So far we focused on Security, Networks and IoT Technologies but we are open to all kinds of subjects that influence the current world.
It’s a one-day invitation-only event, dedicated to IT professionals who will have an opportunity to listen to in-depth technical presentations delivered by both Akamai and external experts.

This year we introduced a new element to the Affinity Tech Talks Conference. The participants will not only meet our great speakers but also have an opportunity to observe the finals of the tense and demanding information security competition - Affinity CTF (Capture the Flag).
The competition was created by Akamai employees and announced on CTFTime.org. The challenge was open to anybody who felt bold enough to stand up to it. In September, over 2000 participants from 450 teams tackled 30 difficult tasks during the 48-hour long run. They tested their knowledge and experience to be in the final four to confront each other in the Affinity CTF finals.
  • 08:00 - 09:00
    • Registration
  • 09:00 - 09:15
    • Opening Ceremony
  • 09:15 - 10:00
  • 10:15 - 11:00
  • 11:15 - 12:00
    • Compliance and the Art of Storytelling
      Compliance is seldom anyone’s favorite activity, but it is an integral, important, and positive piece of any tech company’s operations. Learn about the benefits of participating in compliance activities, and how you can help make compliance exercises easier for your team and your organization.
    • Data Consistency in Complex Systems
      Joris BouwsmaAkamai
      Like any complex system, CDNs evolve and become more sprawling over time. One of the challenges resulting from this evolution is a perception of inconsistency. At Akamai, trillions of transactions are logged every day and processed in multiple subsystems. Through careful curation of the data and systems, it is possible to tame this complexity and evolve towards a perception of simplicity and consistency.
    • Why imperfection is better?
      In the early days, computer software and hardware were the domains of scientists who sought perfection and tried to remove uncertainty at all costs. Their solutions aimed for harmony and beauty. Now, it’s the engineers who took the lead. Recent years have shown that accepting imperfection can be much more fruitful. We live in an age of imperfect solutions and, as shown by examples in this lecture, they are so much better!
  • 12:00 - 13:00Lunch
    Lightning Talks

      12:30 - 12:45

      • Edge computing: One too many questions
        Melissa Chavez TorresAkamai
        This talk will answer high-level questions around Edge Computing, like: what is it? why use it? which challanges come with it? and others.
      • Ethical Machine Learning
        Milena Aragon WendlandAkamai
      • The haunting of the smart house
        Your day at work is over, and you’re almost home. Your door unlocks automatically the moment it recognizes your presence. The house temperature is optimal and the light in the hall is on, the music is playing. The only thing left to do is sit back and relax on the sofa. A few seconds later, the smart alarm turns on and all of the appliances go nuts. The image displayed on your TV says: Pay 0.05 Bitcoin to get the control back. Let's quickly discuss what are the threads of hacking into your smart house.
  • 13:00 - 13:45
    • EZPath: a new safety-review process for Akamai products
      To maintain its position in the marketplace, Akamai products must work consistently and safely. This requires that Akamai engineers have a simple and predictable process for developing safe and resilient products. In the past, product safety and resiliency were evaluated exclusively by subject-matter experts in Akamai's InfoSec department. This process failed to scale with Akamai's recent growth, as it was opaque and often surprising to product teams, as well as limited by the domain-knowledge (or lack thereof) of the reviewer. To address these issues, Akamai has introduced a new process for safety and resiliency reviews: EZPath. In EZPath, products are reviewed not by InfoSec but by members of the product team's own business unit. This vastly increases the pool of available reviewers with greater domain knowledge and provides transparency and insight into the process. In this talk, we illustrate the EZPath. We explain the roles, phases, and outcomes of the process; describe patterns (and anti-patterns) for reviewer engagements; and outline the safety and security considerations that reviewers need to recognize. We finish by describing the impact that this process has had on the safety of Akamai systems, and future work to extend the process to new domains.
    • Artificial Intelligence (AI) in the context of emerging legal issues
      There is no doubt that any AI implementation will raise a number of ethical and legal questions due to its potential risks and unintended consequences. Whilst the new technology is disrupting the market, it also causes concerns in relation to ethics, privacy, bias/discrimination and liability. Nonetheless, there are some mitigating steps companies can take to minimise undesirable outcomes. Artificial Intelligence (AI) has been increasingly used in creating music, graphics, film, and computer programs – the works protected traditionally under copyright law. In a number of cases, AI creates works thanks to self-perfecting algorithms and provided data, without any direct human involvement. One may ask a question if this AI-created work is protected under the copyright or does it belong to the public domain? Second part of the presentation will focus on legal protection of the work created by AI.
    • Developing Visual Cloud services faster with right SDKs
      Data growth, latency and privacy requirements are driving computing towards premise and edge platforms. From there, new services need to be provided to various types of customers. This session will introduce practical examples of software development kits that accelerate developing such applications. The examples will include video analytics and visual cloud services.
  • 14:00 - 14:45
    • U want to hackz? N00bSecurity Labz
      Hacking is an extremely interesting subject, however often your practice capabilities are limited due to various factors. So, how to practice your pwning kung-fu in a controlled but real, modern enterprise envrioment?Join the two borthers on a journey to build a home lab.
    • Hacking Ecology
      Humanity is currently facing an enormous ecological crisis: climate change and the rising rate of species extinctions threaten the state of the biosphere and human life on Earth. In order to avert the ecological crisis of mass extinction, we will need large-scale data science projects to monitor the well-being of ecosystems. Luckily, these projects can, in part, be tackled with a broad citizen science approach.
    • Kubernetes. Kuber-what-is?
      A short story about the most popular container orchestration tool in the world. When was it born? How does it work? Is it related to a celebrity from “Star Trek”, the Borg?
  • 15:00 - 15:45
    • Spectre, Meltdown and the Ghost in the Machine
      James KretchmarAkamai
      The Spectre and Meltdown vulnerabilities disclosed in January 2018 uncovered significant security flaws in the processor architectures of the past few decades. Unfortunately, as many technologists have no background in the inner workings of a CPU, these vulnerabilities are among the most difficult ones to understand. In a tour de force, this talk will explain from the ground up how the CPU interacts with the operating system to explain the basic mechanics of these vulnerabilities, as well as a look at what they mean for the future of online security.
    • Internet Rush Hour - A Behind the Scenes Look
      Most of us use the Internet every day. However, have you ever wondered about how this infrastructure works to deliver your favorite applications and content? When is the Internet busiest and where? How does the performance of the Internet hold up when it is under heavy stress? How has the Internet evolved and will we be able to keep pace with future demands? How is Champions League match similar to a Denial of Service attack? Akamai's massive global platform provides a unique vantage point to observe and make sense of some of these questions. Come join us as Larry Underhill, Akamai's VP of Network Planning and Platform Delivery for EMEA answer these questions and more.
    • On-Call burnout is a real thing
      Piotr StachowiczEdrone
      What is wrong with Root Cause Analysis? And why you need those pesky humans after all?
  • 16:00 - 16:45
    • Semantic safety won't save you
      Dominik 'disconnect3d' Czarnota
      This talk will discuss a sample of security traps in the Python, Go and C programming languages. This sample includes exploitable and "insecure by design" examples of data serialization, IP address validation, "error" handling, thread-unsafe functions, and similar. The examples will come from real software assessments (e.g. Kubernetes, performed by Trail of Bits), capture the flag competitions, and public bug trackers.
    • Asking About Video Quality
      A large part of internet bandwidth is consumed by video, so understanding it as a whole process is very important. One of the key aspects is the quality of video signal, which strongly depends on the reason behind the video’s creation and use. For different reasons we have different measuring tools. In this talk, I will describe some of them with a special focus on humans, who are [!spoiler alert!] not the best measuring device.
    • My Smart Home on Akamai Platform
      Szymon KwapiszewskiAkamai
      Have you wondered how to combine work with a hobby, provide real business value and have fun? You'll find answers to these questions in this session. I will speak about my home automation passion and how I managed to connect that with the engineering manager role at Akamai. I will cover some scenarios where I plugged-in my smart home infrastructure into products developed by my engineering team. Let’s share benefits and funny situations related to “eating own’s dog food”.
  • 17:00 - 17:30
    • Closing Ceremony & CTF Awards
  • 17:30 - 19:00
    • Networking
Previous Sessions