Jump to content

Ian Coldwater: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Angogaru (talk | contribs)
Links were invalid and not legitimate.
Tags: Reverted Mobile edit Mobile web edit
Angogaru (talk | contribs)
Poorly sourced biographical articles of unknown, non-public figures, where the discussions have no editor opposing the deletion, may be deleted after discussions have been completed.
Tags: Reverted Mobile edit Mobile web edit
Line 25: Line 25:


Securing: Kubernetes SIG Security is Here!|date=May 14, 2021|last=Coldwater|first=Ian|type=Video|publisher=[[Cloud Native Computing Foundation]]|time=0:10|last2=Sable|first2=Tabitha|last3=Raghunathan|first3=Savitha|last4=Small|first4=Aaron}}</ref><ref name=":2">{{Cite web|date=2020|title=Ian Coldwater|url=https://kccnceu20.sched.com/speaker/ian420|url-status=live|access-date=July 23, 2021|website=KubeCon + CloudNativeCon Europe 2020}}</ref>
Securing: Kubernetes SIG Security is Here!|date=May 14, 2021|last=Coldwater|first=Ian|type=Video|publisher=[[Cloud Native Computing Foundation]]|time=0:10|last2=Sable|first2=Tabitha|last3=Raghunathan|first3=Savitha|last4=Small|first4=Aaron}}</ref><ref name=":2">{{Cite web|date=2020|title=Ian Coldwater|url=https://kccnceu20.sched.com/speaker/ian420|url-status=live|access-date=July 23, 2021|website=KubeCon + CloudNativeCon Europe 2020}}</ref>

== Career ==
Coldwater started working in tech in their thirties, originally starting in [[DevOps]] before focusing on security.<ref name=":4">{{Cite interview|last=Coldwater|first=Ian|interviewer1=Adam Glick|interviewer2=Craig Box|title=Attacking and Defending Kubernetes, with Ian Coldwater|url=https://kubernetespodcast.com/episode/065-attacking-and-defending-kubernetes/|access-date=July 23, 2021|work=Kubernetes Podcast|publisher=[[Google]]|date=August 6, 2019}}</ref> They began specializing in [[Security hacker|hacking]] and [[Hardening (computing)|hardening]] Kubernetes containers, working as an independent [[Penetration test|penetration tester]] before joining [[Heroku]] as a lead platform security engineer.<ref name=":4" /><ref>{{cite news |last1=Combs |first1=Veronica |date=May 1, 2021 |title=5 weird, cool things I learned from attending Deserted Island DevOps on Animal Crossing |work=[[TechRepublic]] |url=https://www.techrepublic.com/article/5-weird-cool-things-i-learned-from-attending-deserted-island-devops-on-animal-crossing/ |access-date=July 10, 2021}}</ref> As of 2021, they work as a security architect at Twilio.<ref>{{Cite news |last=Lima |first=Cristiano |date=September 16, 2021 |title=Why Democrats are rallying around creating a new FTC privacy bureau to police Big Tech |newspaper=[[The Washington Post]] |url=https://www.washingtonpost.com/politics/2021/09/16/why-democrats-are-rallying-around-creating-new-ftc-privacy-bureau-police-big-tech |access-date=May 17, 2022}}</ref> Along with Tabitha Sable, they co-chair the Kubernetes special interest group, Kubernetes SIG Security.<ref name=":0" /><ref name=":1" /> They are also on the governing board of the [[Open Source Security Foundation]].<ref>{{Cite web|title=Governing Board|url=https://openssf.org/about/governing-board/|url-status=live|access-date=July 23, 2021|website=[[Open Source Security Foundation]]|language=en-US}}</ref>

Coldwater has spoken at conferences including [[DEF CON]],<ref name=":5">{{Cite web|date=2021|title=DEFCON29 Speakers|url=https://defcon.org/html/defcon-29/dc-29-speakers.html#coldwater|url-status=live|access-date=August 5, 2021|website=[[DEF CON]]}}</ref> [[Black Hat Briefings|Black Hat]],<ref>{{Cite web|title=Speaker: Ian Coldwater|url=https://www.blackhat.com/us-19/speakers/Ian-Coldwater.html|url-status=live|access-date=July 23, 2021|website=[[Black Hat Briefings]]}}</ref> [[Cloud Native Computing Foundation#Events|KubeCon and CloudNativeCon]],<ref name=":2" /> [[RSA Conference]],<ref name=":3">{{Cite web|title=Ian Coldwater|url=https://www.rsaconference.com/experts/ian-coldwater|url-status=live|access-date=July 23, 2021|website=[[RSA Conference]]}}</ref> [[O'Reilly Media#Conferences|Velocity]],<ref>{{Cite web|date=2019|title=Speaker: Ian Coldwater|url=https://conferences.oreilly.com/velocity/vl-ca/public/schedule/speaker/318057.html|url-status=live|access-date=July 23, 2021|website=[[O'Reilly Media|O'Reilly]] Velocity Conference|language=en}}</ref> and [[DevOps#History|devopsdays]].<ref>{{Cite web|title=Ian Coldwater|url=https://devopsdays.org/events/2021-minneapolis/speakers/ian-coldwater/|url-status=live|access-date=July 23, 2021|website=devopsdays|language=en-us}}</ref><ref name="award">{{cite news|last1=Cloud Native Computing Foundation|date=November 20, 2020|title=Cloud Native Computing Foundation Announces 2020 Community Awards Winners|url=https://www.prnewswire.com/news-releases/cloud-native-computing-foundation-announces-2020-community-awards-winners-301178231.html|access-date=July 10, 2021}}</ref> In 2020, they received the Top Ambassador award from the [[Cloud Native Computing Foundation]] for spreading interest in the area.<ref name="award" />

''Hacking Kubernetes'', published by [[O'Reilly Media]], credits Coldwater and Duffie Cooley for co-developing the "canonical offensive Kubernetes one-liner".<ref name=":6">{{Cite book |last1=Martin |first1=Andrew |url=https://www.worldcat.org/oclc/1276934473 |title=Hacking Kubernetes : threat-driven analysis and defense |last2=Hausenblas |first2=Michael |date=2021 |publisher=[[O'Reilly Media]] |year=2021 |isbn=978-1-4920-8170-8 |edition=First |location=Sebastapol, CA |oclc=1276934473}}</ref> In 2020, Coldwater and Brad Geesaman presented a talk at RSA 2020 titled Advanced Persistence Threats – The Future of Kubernetes Attacks,<ref>{{Cite web |last=Geesaman |first=Brad |date=March 2, 2020 |title=Advanced Persistence Threats - The Future of Kubernetes Attacks |url=https://darkbit.io/blog/future-kubernetes-attacks-rsa-2020 |access-date=May 17, 2022 |website=Darkbit |language=en}}</ref> in which they demonstrated bypassing Kubernetes audit logs and other attacks.<ref name=":6" /> In 2021, Coldwater, with expertise from Chad Rikansrud, became the first person in history to escape a [[OS-level virtualization|container]] on a [[Mainframe computer|mainframe]].<ref name=":5" /><ref>{{Cite web |title=Container Breakout: Cybersecurity Lessons Learned |url=https://blog.share.org/Article/container-breakout-cybersecurity-lessons-learned |access-date=2022-01-24 |website= |publisher=[[SHARE (computing)|SHARE]] |language=en-US}}</ref>


== Personal life ==
== Personal life ==

Revision as of 21:21, 2 July 2022

Ian Coldwater
Coldwater, wearing a black parka and beanie hat
Ian Coldwater
Occupation(s)Computer security specialist and speaker
EmployerTwilio
Organization(s)Kubernetes SIG Security, Open Source Security Foundation
Securing: Kubernetes SIG Security is Here!|date=May 14, 2021|last=Coldwater|first=Ian|type=Video|publisher=Cloud Native Computing Foundation|time=0:10|last2=Sable|first2=Tabitha|last3=Raghunathan|first3=Savitha|last4=Small|first4=Aaron}}</ref>[1]

Personal life

Coldwater lives in Minneapolis, Minnesota.[2]

See also

References

  1. ^ "Ian Coldwater". KubeCon + CloudNativeCon Europe 2020. 2020. Retrieved July 23, 2021.{{cite web}}: CS1 maint: url-status (link)
  2. ^ Cite error: The named reference :3 was invoked but never defined (see the help page).
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy