Speaker

Keith Casey

Keith Casey

Driving the machine apocalypse since 2001

Austin, Texas, United States

Actions

Keith “Danger” Casey currently serves on the Product Team at Pangea helping teams launch their systems faster and easier than ever before. Previously, he served on the Product Teams at ngrok launching GTM efforts, Okta working on Identity and Authentication APIs, as an early Developer Evangelist at Twilio, and worked to answer the Ultimate Geek Question at the Library of Congress. His underlying goal is to get good technology into the hands of good people to do great things. In his spare time, he writes at CaseySoftware.com, lives in the woods, and has recorded numerous API courses with LinkedIn Learning.

Area of Expertise

  • Information & Communications Technology
  • Business & Management

Topics

  • API Design
  • api security
  • apis
  • Product Manager
  • Product Development
  • Product Marketing

PRO WORKSHOP: API Security: When Failure Looks like Success

In the last decade, APIs have become fundamental to our teams, partners, and customers. While we’d like to believe it all happened as a carefully executed plan, let’s be honest… there’s as much luck as foresight in the mix. Luckily, success drives success so we’ve seen things explode in great ways. Unfortunately, that very success has cost us too.APIs are becoming a consistent and devastating attack vector for applications that store everything from financial records to passport information to what you’re looking for in a date. In this session, we’ll reconsider some our earliest assumptions and lay out some strategies for bringing our APIs out of the shadows and protecting ourselves, our partners, and our customers.

Lift & Shift, Cut Overs, and other Bad Habits

The last time you moved, you had that box. You haven’t opened it in years. You still haven’t opened it but you carry it around with you like a treasured keepsake. Unfortunately, we moved to the cloud the same way. We brought all of our habits, practices, and patterns without considering which may be strengths or weaknesses.

In this session, we’ll skip the tools and take a look at our new constraints and capabilities the cloud gives us. Through this, we’ll explore three architectural Cloud Design Patterns - Circuit Breaking, the Strangler, and Pub/Sub - to make our systems more reliable, more maintainable, and probably cheaper to run.

The Many Layers of OAuth

OAuth is one of the most important but most misunderstood frameworks out there. What you think it is, it probably isn’t. What it actually is, you probably hadn’t considered. Regardless, when you consider the standards, specifications, and common practices interact and fit together, it’s impressive what you can accomplish with minimal effort.

In this session, we’ll explore the most common RFCs and implementations that are combined to make powerful, robust, and secure solutions that drive modern software development.

Webhooks: Lessons (Un)learned

Webhooks are a pillar of modern application development. They notify us of that new commit, an incoming text message, our email was delivered, and a payment was processed. Our systems can’t function without webhooks sending data seamlessly and securely across the internet.

But what happens if they’re not secure? What happens if your webhooks are intercepted, manipulated, or even replayed against your systems? What are the best ways - as both a provider and consumer - to protect our systems?

In this session, we’ll delve into the 100+ implementations we explored to build webhooks.fyi to identify the best and worst patterns to protect our systems now and in the future.

Building GitHub Actions with ngrok

Building your first GitHub Actions workflow can be exciting. You dig into the documentation, write a cool operation, and immediately have to stand up a server in the cloud or navigate your firewall and DNS changes. What started as a fun, simple way to automate your software development processes became a mess of ports, protocols, and networking. What if it didn’t have to be? What if you could sit down to build and actually build?

In this presentation, we’ll cut through the complexity and show you how to securely configure service containers, add CI/CD, or automate workflows that make your life easier. We’ll start from hello world, explore routing and debugging requests, and extend our integration live to handle changes in your code, repository, and explore all you can do with ngrok and GitHub together.

The Many Layers of OAuth

OAuth is one of the most important but most misunderstood frameworks out there. What you think it is, it probably isn’t. What it actually is, you probably hadn’t considered. Regardless, when you consider the standards, specifications, and common practices interact and fit together, it’s impressive what you can accomplish with minimal effort.

In this session, we’ll explore the most common RFCs that are combined to make powerful, robust, and secure solutions that drive modern software development.

php[tek] 2023 Sessionize Event

May 2023 Chicago, Illinois, United States

Orlando Code Camp 2023 Sessionize Event

March 2023 Sanford, Florida, United States

API World 2019 Sessionize Event

October 2019 San Jose, California, United States

KCDC 2018 Sessionize Event

July 2018

Keith Casey

Driving the machine apocalypse since 2001

Austin, Texas, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top