You are viewing details from a past event. Please check our upcoming event schedule if you are looking for current content.

Peter Pavlovich

CTO, Censinet

Peter is the CTO of Censinet, based in Boston, MA.

Before joining Censinet, Peter was the Chief Software Architect at Embue Technologies, an Apartment Building Intelligence platform provider based in Boston, MA. Before joining Embue, Peter was the Principal Architect for EnerNOC Labs, a dedicated R&D group within EnerNOC, a Global provider of Demand Response and Energy Inteligence software located in Boston, MA. Prior to EnerNOC, Peter was a Principal Cloud Engineer with Kronos Incorporated, a global provider of on-premise and cloud-based workforce management solutions. Before Kronos, Peter held the position of Technical Director with Brokat Technologies, a global provider of mobile payment solutions. Prior to that, Peter was a Sr. Architect with GemStone Systems, providing distributed, enterprise-ready data grid and object persistence solutions and J2EE application server technologies.

Peter has a Honors degree in pure mathematics from McMaster University in Hamilton, Ontario, Canada. He is a technology addict and evangelist and has led many grass-roots efforts to introduce leading edge, advanced technologies and development processes.

A lifetime learner, Peter thrives on digesting new technologies and sharing his discoveries with others. He has authored and delivered numerous technical seminars on a variety of topics including React, VueJS, Angular, Ruby on Rails, Grails, Git, Meteor, Flex, GWT and AOP.

To find out more about Peter, check out his LinkedIn profile: https://www.linkedin.com/in/peterpavlovich

Presentations

Zero Trust Security: Effective authentication strategies, architecture and best practices

11:00 AM MDT

Everywhere you look, security breeches, phishing attacks and ransomware attacks are in the news and should be in the forefront of every technical leader's top 10 concerns. An effective strategy to combat such attacks and vulnerabilities begins with a zero-trust inspired authentication strategy, application architecture and deployment infrastructure.

Join us for an in depth analysis of the current options and best practices around implementing zero-trust compliant, modern authentication architectures and systems.

Everywhere you look, security breeches, phishing attacks and ransomware attacks are in the news and should be in the forefront of every technical leader's top 10 concerns. An effective strategy to combat such attacks and vulnerabilities begins with a zero-trust inspired authentication strategy.

Join us for an in depth analysis of the current options and best practices around implementing zero-trust compliant, modern authentication, architectures and systems.

Hacker-proof MFA including hardware-based authenticators

1:30 PM MDT

Zero Trust Security and Authentication is on most CISOs, CTOs and architects top 10 'must do' lists and for good cause! Everywhere you read about bad actors, phishing and ransomware attacks with ever increasing frequency. Join us to learn how to implement one of the safest, most hacker-proof means of authenticating your users available today: Hardware-based authenticators!

Hardware based authenticators include security keys as well as device-resident bio-authenticators such as TouchId and Windows Hello. In this presentation, we will explore these devices, how they are accessed, managed and used to provide virtually hacker-proof authentication in modern web applications. We will discuss the current industry standards and specs which govern these devices and their use including FIDO and WebAuthn.

Uploading threats: Malware and virus detection and elimination

3:15 PM MDT

Many of our apps allow users to upload files which then become available for some users to (re)download. Viruses and malware could tailgate these files into your system and infect your users! Join us to learn how to avoid this potential fatal mistake!

Malware and virus-based attacks are on the rise. We have all seen the news stories all around us. How do you easily prevent damage to your corporate reputation and potentially devistating damage to your users from such threats?

Join us for an in-depth discussion and exploration of an effective architecture which detects, isolates and prevents downloading of infected uploaded files. We will also discuss other practical limits you should place on file uploads to avoid performance and UX issues.