![Disha Babla](https://sessionize.com/image/31dc-400o400o2-B1xe2z2AJStFFbA6E7yg4t.jpg)
Disha Babla
AWS Technical Account Manager
Bengaluru, India
Actions
Disha Babla, AWS Technical Account Manager at Amazon Web Services is a Technologist and Passionate Learner. She is a 10X AWS Certified Professional holding 8+ years of experience in the IT Training Industry. In her previous organizations, she has worked in customer-centric roles for Security, Infrastructure and Architecting areas. She has been a Senior Technical Trainer and delivers training on a variety of technologies on AWS Cloud, globally. She believes in the vision of the 'Never Stop Learning' strategy and helps customers to become the torchbearers of this vision.
Links
Area of Expertise
Topics
Model Watermarking on Kubernetes: Protecting AI Intellectual Property at Scale
Ever wondered how to protect your AI models from being copied without permission? As companies invest millions in AI, safeguarding intellectual property is critical. Join us to explore scalable watermarking techniques for AI models using Kubernetes.
Learn how to embed subtle, detectable digital fingerprints into machine learning models—proving ownership without affecting performance. Discover how Kubernetes can automate these processes within your ML pipeline, addressing key challenges like:
• Designing robust watermarking pipelines for end-to-end model protection.
• Leveraging Kubernetes custom controllers and (Custom Resource Definition) CRDs for automation.
• Monitoring and debugging watermarked models in production.
• Balancing protection strength with inference speed.
• Compliance, auditing, and recovery strategies.
Ideal for platform engineers, ML teams, and architects, this session offers practical solutions for secure, scalable AI model protection.
Securing Kubernetes Clusters with AIOps - Lessons from the Capital One Breach
The massive 2019 Capital One data breach exposed sensitive information on 100+ million customers due to a misconfigured Kubernetes firewall. This talk will detail how AIOps techniques like anomaly detection, log analysis, and metrics correlation could have prevented the breach by automatically detecting and locking down the vulnerable Kubernetes pod.
I will provide a technical analysis of the Capital One attack chain along with code examples demonstrating how common AIOps platforms like Dynatrace, DataDog, and Prometheus could have autonomously detected the unusual cluster activity in real-time. Attendees will learn Kubernetes best practices for network policies, pod security contexts, and runtime threats that can be enforced automatically via policy as code when AIOps signals a potential intrusion.
Serverless Streaming with Apache Kafka on AWS
Kafka is increasingly being used by customers for streaming as well as building event driven applications. Kafka can be run in several different ways - Confluent has several Kafka offerings and there is our very own MSK. Join this session to learn more about Confluent and MSK and how AWS lambda can integrate with both to build serverless streaming/event-driven applications.
Containers on AWS
Container management tools can be broken down into three categories: registry, orchestration, and compute. AWS offers services that give you a secure place to store and manage your container images, orchestration that manages when and where your containers run, and flexible compute engines to power your containers. AWS can help manage your containers and their deployments for you, so you don't have to worry about the underlying infrastructure. No matter what you're building, AWS makes it easy and efficient to build with containers. This will be an expert talk on the best practices of deployment in DevSecOps environment for orchestration, architecture and security of containers.
Infrastructure Security of Kubernetes in AWS
Cloud security at AWS is the highest priority. At AWS Cloud, you benefit from a data center and network architecture that is built to meet the requirements of the most security-sensitive organizations. Deep Dive on Securing your k8s cluster in the cloud and utilization of managed cloud services for the security of the cloud.
Security in the cloud includes:
- The security configuration of the data plane, including the configuration of the security groups that allow traffic to pass from the Amazon EKS control plane into the customer VPC.
- The configuration of the nodes and the containers themselves
- The node's operating system (including updates and security patches)
- Setting up and managing network controls, such as firewall rules
- The sensitivity of your data, your company's requirements, and applicable laws and regulations
- Safeguarding from different attacks.
![](https://sessionize.com/image/31dc-400o400o2-B1xe2z2AJStFFbA6E7yg4t.jpg)
Disha Babla
AWS Technical Account Manager
Bengaluru, India
Links
Actions
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top