| Saturday | 
        
        
            |  | Threat Modelling for Developers | Security | 10:30 | 10:55 | 
        
        
            |  | AMENDMENT Custom Crypto Policies by Examples Management of crypto algorithm restrictions
 | Security | 11:00 | 11:25 | 
        
        
            |  | Securing Existing Software using Formally Verified Libraries | Security | 11:30 | 11:55 | 
        
        
            |  | SpecFuzz: Bringing Spectre-type vulnerabilities to the surface | Security | 12:00 | 12:25 | 
        
        
            |  | Falco Internals 101 : Syscalls processing for security analysis What happens when you have: syscalls, a kernel module, an eBPF probe and a Ring Buffer?
 | Security | 12:30 | 12:55 | 
        
        
            |  | Docker Security considerations & Incident Analysis | Security | 13:00 | 13:25 | 
        
        
            |  | Incrementality and deck functions Simple protocols and efficient constructions in symmetric cryptography
 | Security | 13:30 | 13:55 | 
        
        
            |  | How Transparent Data Encryption is built in MySQL and Percona Server ? | Security | 14:00 | 14:25 | 
        
        
            |  | Secure logging with syslog-ng Forward integrity and confidentiality of system logs
 | Security | 14:30 | 14:55 | 
        
        
            |  | Protecting plaintext secrets in configuration files | Security | 15:00 | 15:25 | 
        
        
            |  | Application Whitelisting in Linux Environment | Security | 15:30 | 15:55 | 
        
        
            |  | seccomp — Your Next Layer of Defense | Security | 16:00 | 16:25 | 
        
        
            |  | Kernel Runtime Security Instrumentation LSM+BPF=KRSI
 | Security | 16:30 | 16:55 | 
        
        
            |  | Using SELinux with container runtimes | Security | 17:00 | 17:25 | 
        
        
            |  | The hairy issue of e2e encryption in instant messaging | Security | 17:30 | 17:55 | 
        
        
            |  | What you most likely did not know about sudo… | Security | 18:00 | 18:25 | 
        
        
        
            | Sunday | 
        
        
            |  | How Firefox upholds its values and keeps up with change | Mozilla | 09:00 | 09:25 | 
        
        
            |  | Thunderbird in 2020 and Beyond A Look into the Future of the Thunderbird Project.
 | Mozilla | 09:30 | 10:00 | 
        
        
            |  | Make it accessible Tips and tricks for create a good accessible frontend
 | Mozilla | 10:00 | 10:25 | 
        
        
            |  | Is the web rea11y for all? Firefox DevTools & A11y
 | Mozilla | 11:00 | 11:25 | 
        
        
            |  | What are the Top 10 Frustrations for Web Developers and Designers? Lessons from the 2019 MDN Developer Needs Assessment
 | Mozilla | 11:30 | 12:10 | 
        
        
            |  | Discover the New Firefox Profiler | Mozilla | 12:15 | 12:40 | 
        
        
            |  | Web compatibility and ML Improving webcompat issue triaging using ML
 | Mozilla | 12:45 | 13:10 | 
        
        
            |  | Facilitating distributed deterministic computation with WASI | Mozilla | 13:15 | 13:55 | 
        
        
            |  | Loanwords, Agriculture & WebAssembly | Mozilla | 14:00 | 14:25 | 
        
        
            |  | AMENDMENT A Mozilla IoT Forecast thats Sunny and Clear -- No Clouds! WebThings by Mozilla
 | Mozilla | 14:30 | 14:55 | 
        
        
            |  | AMENDMENT Generate a DeepSpeech model with the help of your community How to get fun with teamwork
 | Mozilla | 15:00 | 15:25 | 
        
        
            |  | Privacy by Design | Mozilla | 15:30 | 15:55 | 
        
        
            |  | What Makes People Come and What Makes Them Stay | Mozilla | 16:00 | 16:30 |