BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.devconf.info//devconf-cz-2026//talk//3GLWMU
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-devconf-cz-2026-3GLWMU@pretalx.devconf.info
DTSTART;TZID=CET:20260619T123000
DTEND;TZID=CET:20260619T130500
DESCRIPTION:Generative AI might be the future\, but it still runs on Python
 \, glibc\, OpenSSL\, and the Linux kernel. What happens when a critical CV
 E drops in these foundational components? If you blindly update\, you risk
  breaking brittle ML dependencies. If you do nothing\, your AI infrastruct
 ure becomes a massive attack vector.\n\nIn this session\, we will explore 
 incident response from the perspective of an Enterprise Linux distro engin
 eer. We will demystify how CVE severity is analyzed specifically for AI wo
 rkloads and unpack the delicate engineering decisions behind backporting s
 ecurity fixes without triggering regressions in complex AI runtimes.\n\nTh
 rough a hands-on live demo\, we will recreate a historical CVE in a core c
 ryptographic library\, demonstrate its impact on a running AI inference se
 rvice\, and apply a seamless system patch to validate service continuity. 
 You will leave with a practical playbook for navigating security crises wi
 thout sacrificing the stability of your production AI.
DTSTAMP:20260430T124923Z
LOCATION:E104 (capacity 72)
SUMMARY:Backports Over Breakages: Patching AI Stacks Without Killing Your M
 odels - Satish Mane\, Nikita Sanjay Patwa
URL:https://pretalx.devconf.info/devconf-cz-2026/talk/3GLWMU/
END:VEVENT
END:VCALENDAR
