Log in to bookmark your favorites and sync them to your phone or calendar.
Securing Access: Leveraging IGA, JIT & Policy Control... 10:00am - 10:50am
Day in the Life of a Supply Chain Security Resea...
Uncovering 100K Security Violations: Strengtheni...
Analyzing Zero Trust Architecture in the Age of Agent... 1:00pm - 1:50pm
Past, Present and Future of Automatic Code Remediatio... 2:00pm - 2:50pm
Supercharge your AppSec Program with OWASP Appdome Co... 3:00pm - 3:50pm
No Laughing Matter: The OWASP Top 10 for LLMs in Code... 10:00am - 10:50am
Hunting Path Traversal in Open Source: Fix>Find
Exploit Me, Baby, One More Time: Finding Command...
Getting an LLM to Hack Itself: On AI, Moral Dilemmas,... 1:00pm - 1:50pm
No Fate But What We Make: Doing Intrusion Prediction 2:00pm - 2:50pm
Don’t Make This Mistake: Painful Learnings of Applyin... 10:00am - 10:50am
Rethinking Threat Modeling for Dev Teams: A Scal...
Unmasking DNS Threats: Protecting the Internet’s...
Unlocking Secure Development: A Deep Dive into OWASP... 1:00pm - 1:50pm
Everyone Can Play! Building CTFs To Teach Non-Securit... 2:00pm - 2:50pm
Workshop - API Underworld: Red Team Hacking Secret 9:00am - 11:30am
WORKSHOP - How to Hack an Android App 1:00pm - 3:30pm
WORKSHOP - Riding the Snake With OpenDR: Detecting Living Off the Land Techniques in Python With a FOSS Tool 9:00am - 11:30am
Share this link via
Or copy link