
Danny Jung
Cyber Security Evangelist
Halle (Saale), Germany
Actions
Danny has been working with Linux in the enterprise security market for more than 20 years. He created many award-winning open source tools, contributed articles about open source and Linux to EvilTux.com and regularly speaks at security and open source related exhibitions. Danny is currently working as a Cyber Security Evangelist at SITS Group.
Besides his passion for IT and open source he’s a husband and father of two.
Area of Expertise
Topics
AI-Powered Certification Prep: Smarter Learning for Open Source Experts
Mastering technical certifications is a valuable step for open-source contributors and professionals, but preparation can often be overwhelming. In this session, we’ll explore how AI can assist in studying smarter—whether by generating tailored practice questions, helping learners grasp challenging concepts, and even guiding responses when faced with uncertainty. We’ll discuss how AI-powered tools can enhance the learning experience, foster deeper understanding, and create a more confident approach to certification success. Whether you’re preparing for exams or simply want to solidify knowledge in your field, this session will provide insights and practical strategies to leverage AI for smarter learning.
Seeing Beyond Syntax: AI for Code Exploration & Enhancement
Code isn’t just written—it’s crafted. Yet, navigating your own code or understanding someone else's can be a maze of logic, architecture, and intent. Enter AI-powered code review, documentation, and optimization tools—your new coding co-pilot.
In this session, we'll explore how AI can enhance the way developers document and review code, uncover performance bottlenecks, and gain deeper insights into functionality. Whether you're maintaining an open-source project or diving into unfamiliar repositories, AI-driven analysis can offer a fresh perspective, helping developers not just read code, but truly understand it.
Join me to discover how AI can elevate your coding practices, sharpen your reviews, and boost open-source collaboration.
Linux Security Best Practices
Keeping your Linux installation secure means more than just regular software updates and preventing users from directly logging in as root. Join this session to learn about best practice tasks to secure your Linux OS.
Seeing Beyond Syntax: AI for Code Exploration & Enhancement
Code isn’t just written—it’s crafted. Yet, navigating your own code or understanding someone else's can be a maze of logic, architecture, and intent. Enter AI-powered code review, documentation, and optimization tools—your new coding co-pilot.
In this lightning talk, we'll explore how AI can enhance the way developers document and review code, uncover performance bottlenecks, and gain deeper insights into functionality. Whether you're maintaining an open-source project or diving into unfamiliar repositories, AI-driven analysis can offer a fresh perspective, helping developers not just read code, but truly understand it.
Join me to discover how AI can elevate your coding practices, sharpen your reviews, and boost open-source collaboration.
AI Empowering Enterprise Cybersecurity
Uncover how artificial intelligence is revolutionizing enterprise cybersecurity through cutting-edge innovation. This session will showcase Check Point’s Infinity AI Copilot and ThreatCloud AI, demonstrating their seamless integration of generative AI and threat intelligence. Learn how AI-powered tools automate intricate security tasks, enhance threat detection and response, and provide unparalleled insights to safeguard against modern cyber threats. Attendees will gain an insider's look into real-world applications, including AI-driven rulebase configuration, proactive threat prevention, and streamlined security operations that empower organizations to stay resilient in an ever-changing threat landscape.
Linux Runs the World’s Enterprise Firewall Security
Open source has driven the growth of many open firewall distributions which are often used by small and medium businesses. Big businesses in the enterprise security market have not noticeably adopted open source firewalls yet. But wait, interestingly all leading enterprise firewall distributions run their proprietary firewall software on open source Linux. So let’s have a closer look at their open source relationship.
Linux OS Hardening Benefits
System hardening is a crucial practice for enhancing the security of a Linux operating system. When you harden an OS, you minimize its attack surface to make it more difficult for attackers to compromise your Linux system. You also decrease the likelihood of exploitation, malware injection, or unauthorized access. When the attack surface is smaller, the risk of security breaches diminishes significantly. Organizations handling sensitive data (such as Personally Identifiable Information or financial records) face significant fines for data breaches. Hardening helps meet compliance standards and avoids reputational damage caused by security incidents.
In summary, system hardening is essential for safeguarding your Linux OS, especially when dealing with sensitive data or critical infrastructure.
Interactive Linux Bash Commands
There's an easy way to run all your preferred Linux commands and one-liners from a single bash script that allows you to interactively select, show and execute them. This session introduces you to the concept which also features displaying system information and health checks directly at the CLI. It's time to optimize your Linux CLI workflow, avoid typing mistakes when running commands and quickly access all your CLI scripts with just a few clicks.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top