Peter Pavlovich

CTO, Censinet

Peter Pavlovich

Peter is the CTO of Censinet, based in Boston, MA.

Before joining Censinet, Peter was the Chief Software Architect at Embue Technologies, an Apartment Building Intelligence platform provider based in Boston, MA. Before joining Embue, Peter was the Principal Architect for EnerNOC Labs, a dedicated R&D group within EnerNOC, a Global provider of Demand Response and Energy Inteligence software located in Boston, MA. Prior to EnerNOC, Peter was a Principal Cloud Engineer with Kronos Incorporated, a global provider of on-premise and cloud-based workforce management solutions. Before Kronos, Peter held the position of Technical Director with Brokat Technologies, a global provider of mobile payment solutions. Prior to that, Peter was a Sr. Architect with GemStone Systems, providing distributed, enterprise-ready data grid and object persistence solutions and J2EE application server technologies.

Peter has a Honors degree in pure mathematics from McMaster University in Hamilton, Ontario, Canada. He is a technology addict and evangelist and has led many grass-roots efforts to introduce leading edge, advanced technologies and development processes.

A lifetime learner, Peter thrives on digesting new technologies and sharing his discoveries with others. He has authored and delivered numerous technical seminars on a variety of topics including React, VueJS, Angular, Ruby on Rails, Grails, Git, Meteor, Flex, GWT and AOP.

To find out more about Peter, check out his LinkedIn profile: https://www.linkedin.com/in/peterpavlovich

Presentations

Uploading threats: Malware and virus detection and elimination

Wednesday, 11:00 AM CDT

Many of our apps allow users to upload files which then become available for some users to (re)download. Viruses and malware could tailgate these files into your system and infect your users! Join us to learn how to avoid this potential fatal mistake!

Malware and virus-based attacks are on the rise. We have all seen the news stories all around us. How do you easily prevent damage to your corporate reputation and potentially devistating damage to your users from such threats?

Join us for an in-depth discussion and exploration of an effective architecture which detects, isolates and prevents downloading of infected uploaded files. We will also discuss other practical limits you should place on file uploads to avoid performance and UX issues.

Hacker-proof MFA including hardware-based authenticators

Wednesday, 1:30 PM CDT

Zero Trust Security and Authentication is on most CISOs, CTOs and architects top 10 'must do' lists and for good cause! Everywhere you read about bad actors, phishing and ransomware attacks with ever increasing frequency. Join us to learn how to implement one of the safest, most hacker-proof means of authenticating your users available today: Hardware-based authenticators!

Hardware based authenticators include security keys as well as device-resident bio-authenticators such as TouchId and Windows Hello. In this presentation, we will explore these devices, how they are accessed, managed and used to provide virtually hacker-proof authentication in modern web applications. We will discuss the current industry standards and specs which govern these devices and their use including FIDO and WebAuthn.

Zero Trust Security: Effective authentication strategies, architecture and best practices

Wednesday, 3:15 PM CDT

Everywhere you look, security breeches, phishing attacks and ransomware attacks are in the news and should be in the forefront of every technical leader's top 10 concerns. An effective strategy to combat such attacks and vulnerabilities begins with a zero-trust inspired authentication strategy, application architecture and deployment infrastructure.

Join us for an in depth analysis of the current options and best practices around implementing zero-trust compliant, modern authentication architectures and systems.

Everywhere you look, security breeches, phishing attacks and ransomware attacks are in the news and should be in the forefront of every technical leader's top 10 concerns. An effective strategy to combat such attacks and vulnerabilities begins with a zero-trust inspired authentication strategy.

Join us for an in depth analysis of the current options and best practices around implementing zero-trust compliant, modern authentication, architectures and systems.

Resiliency, Reliability and Scalability: Tools and Techniques for the Enterprise

Wednesday, 5:00 PM CDT

You built the app. You are ready to launch! But how do you proceed from there? You need to ensure that, once deployed, your app remains 'up', healthy, available and secure. For that, you are going to need some serious tools in your belt! Join us as we explore the tools and services you can use to complete your deployment stack and give you all of the monitoring and control that you need for a successful launch!

You built the app. You are ready to launch! But how do you proceed from there? You need to ensure that, once deployed, your app remains 'up', healthy, available and secure. For that, you are going to need some serious tools in your belt! Join us as we explore the tools and services you can use to complete your deployment stack and give you all of the monitoring and control that you need for a successful launch!