Victor Lyuboslavsky

Victor Lyuboslavsky is a software engineering leader and author with over 25 years of experience building products and leading teams. He has co-founded startups, held technical leadership roles at AMD, and now architects secure, scalable systems for enterprise IT at Fleet Device Management.

Victor’s work bridges the gap between hands-on technical execution and strategic leadership. His talks draw on lessons from startups and open source communities, showing how clarity, transparency, and evolutionary design help teams move fast without creating chaos.

Whether speaking on AI’s role in development, scaling architectures, or leading with openness, Victor helps engineers and leaders think like builders of resilient companies.


Session

05-05
11:15
20min
Open Source Endpoint Telemetry Blueprint for Security Teams
Victor Lyuboslavsky

Endpoints are where most security incidents begin. Compromises often start with phishing, software vulnerabilities, or simple misconfigurations on individual laptops and servers. Modern security teams rely on endpoint telemetry for detection, investigation, and response. But for many engineers, this part of the stack remains opaque and difficult to reason about.

This talk presents a practical, open-source blueprint for building an endpoint telemetry pipeline that engineers can actually understand and evolve. We start with osquery, a Linux Foundation project that exposes endpoint state as structured, queryable data. On top of that, we build a layered system with clear responsibilities. This includes a control layer for intent and coordination, a data layer responsible for ingestion, buffering, streaming, and storage, a detection and intelligence layer with inspectable logic, and a correlation and response layer designed for humans in the loop.

Rather than pitching a product, this talk focuses on boundaries, contracts, and tradeoffs. We walk through real-world design decisions and common failure modes. We also explore why ownership of telemetry matters more than any single tool. Attendees will leave with a mental model they can adapt, a stack they can run locally, and the confidence to build endpoint security systems that are transparent, flexible, and defensible without relying on closed platforms.

Presentation
Inspiration A/B