Security conference talks

Roc Alayo Arnabat & Sergi Rosell Ferrer - GitOps in Modern Security-Compliant Environments

Roc Alayo Arnabat & Sergi Rosell Ferrer - GitOps in Modern Security-Compliant Environments

PyData Chicago January 2023 Meetup | Securday: Natural Language Network Scanner

PAR: Securing the OAuth and OpenID Connect Front-Channel - Dominick Baier - NDC Security 2024

Why Security Is Important in ML and How To Secure Your ML-based Solutions | Rachid Kherrazi

Security Champions? Introduce them in your Organisation | Ives Laaf

The insecurity of OAuth 2.0 in frontends - Philippe de Ryck - NDC Security 2023

SAINTCON 2016 - Kevin Stultz - Docker Container Security

Adelina Simion & Artur Kondas - The shimmy to the left: why security is coming for engineers

Why Should Developers Care about Container Security? - Eric Smalling

Navigating the Cloud Native Security Landscape - Pablo Musa - NDC Porto 2023

SHIFT left, not S#!T left - How to launch your shift left security effort | Larry Maccherone

Panda to gibbon is the least of your worries: why securing AI is not what you think - Sarah Young

Unsafe At Any Speed: CISA's Plan to Foster Tech Ecosystem Security

Introduction to Kubernetes Security - Marc Boorshtein

SAINTCON 2016 - Cory Stokes & Derek Larson - Using Security Self Assessment Survey Tools

Security Best Practices for Django Applications with Gajendra Deshpande - DjangoCon US 2022

DevOps Tech: Shifting Left on Security (Presented by: Portshift.io)

Getting API security right - Philippe De Ryck - NDC London 2023

Java Security & the Java Ecosystem • Nicolas Frankel & Preben Thorø

Shifting from Syntax to Secure Software Development Processes • Laura Bell Main • YOW! 2023

Protect Your Code with GitHub Security Features • Rob Bos • GOTO 2023

Alex Soto - Securing Secrets in the GitOps era

Philipp Krenn - Open Policy Agent: security for cloud natives and everyone else

Talks - Nina Zakharenko: Why You Should Care About Open Source Supply Chain Security

Forward Focus: Perspectives on AI, Hype, and Security

Securing SPAs and Blazor Applications using the BFF (Backend for Frontend) Pattern - Dominick Baier

ElixirConf 2023 - Michael Lubas - Elixir Security: a Business and Technical Perspective

Why Security Initiatives Are Doomed to Fail & What You Can Do About It • Josh Armitage • YOW! 2023

37C3 - Writing secure software

Houston, We Have a Problem: Analyzing the Security of Low Earth Orbit Satellites

Keynote: How I Met Your Data - Troy Hunt - NDC Security 2024

Open Source Pentesting and Security Analysis Tools: the DevOps way… #slideless

Glitched on Earth by Humans: A Black-Box Security Evaluation of the SpaceX Starlink User Terminal

Securing Microservices with Auth0 and MicroProfile in Kubernetes without a hassle | Ondro Mihalyi

Decoding Modern Tech: Cloud, APIs, Wasm, Security, & More • Daniel Bryant & Matt Turner • GOTO 2023

Say Vulnerabilities One More Time - Ending Open Source Security Fatigue - Alyssa Miller

Armon Dadgar – Zero Trust Security

Taking your crypto security to the next level

Security By Design • Ana Oprea • GOTO 2023

In Defence of PHP - Stephen Rees-Carter - NDC Security 2023

Route to Bugs: Analyzing the Security of BGP Message Parsing

Defender-Pretender: When Windows Defender Updates Become a Security Risk

SAINTCON 2016 Keynote - Georgia Weidman - Nine years into mobility, has security caught up?

Staying Safe and Secure with Angular | Alisa Duncan | ng-conf Webinar

Zero Trust Security for your APIs - Akshata Sawant

mc.fly: Perimeter security is dead, get over it.

SAINTCON 2016 - Sam Mclane - Changing the Economics of Security Operations

From Hackathon to Hacked: Web3's Security Journey

SAINTCON 2023 - Chad Walker - Securing Big Stupid Machines

The Hacker's Guide to JWT Security - Patrycja Wegrzynowicz

Adam Števko - Journey to Securing the Cloud: Detecting and Fixing Misconfigurations at Datadog

How secure is your build/server? a story of packages and trust

Philipp Krenn - Open Policy Agent: security for cloud natives and everyone else

Go security pitfalls; 2 lessons from the battlefield at Grafana Labs - Jeremy Matos

Adam Števko - Journey to Securing the Cloud: Detecting and Fixing Misconfigurations at Datadog

Securing the Future: Balancing Cybersecurity and Innovation. Panel moderated by Elvīra Krēķe

DPC2021: Securing PHP APIs with Decentralised Identity Tokens - Mohammad Shahbaz Alam

37C3 - RFC 9420 or how to scale end-to-end encryption with Messaging Layer Security

Catching Commits to Secure Infrastructure as Code • Rosemary Wang • GOTO 2023

Alex Soto - Securing Secrets in the GitOps era

SAINTCON 2023 - Chris Honda - Making Security Happen Without Being A Jerk

Deputy National Security Advisor, Cyber & Emerging Tech Anne Neuberger | Full Interview | Code 2022

Badge of Shame: Breaking into Secure Facilities with OSDP

SAINTCON 2023 - Jesse Harris - DNS as a Security Tool

How to Secure Your Node.js Containers on Kubernetes With Best Practices - Deepu K Sasidharan

[VDCLUJ22] Laurențiu Spilcă - The new Spring Security

How to Build a Distributed & Secure Database Ecosystem with PostgreSQL - Trista Pan - PGCon 2022

Security in Drupal: what can go wrong?

37C3 - Unlocking Hardware Security: Red Team, Blue Team, and Trojan Tales

Attack on Titan M, Reloaded: Vulnerability Research on a Modern Security Chip

🚀 Securing Your Infrastructure with Vault (Paul Stack)

SAINTCON 2016 - Jerry Smith - Privacy and Security : Which comes first?

GNUnet: A network protocol stack for building secure, distributed, and privacy-preserving applicati…

Revolutionising Information Security with Blockchain - Certihash Sentinel Node | #LDNBlockchain23

AI Assisted Decision Making of Security Review Needs for New Features

Google Reimagined a Phone. It was Our Job to Red Team and Secure it.

Protect against unknown security vulnerabilities - Bastian Hofmann

Building Secure Microservices in Azure - Jimmy Bogard - NDC London 2023

The Hacker’s Guide to Kubernetes Security by Patrycja Wegrzynowicz

Shuffle Up and Deal: Analyzing the Security of Automated Card Shufflers

Over the Air, Under the Radar: Attacking and Securing the Pixel Modem

SAINTCON 2023 - Derek Espiritu - Breaking Into Cyber Security

Process Injection: Breaking All macOS Security Layers With a Single Vulnerability

The Integration Cyber Security and Insurance: The Journey of Cysurance

Security Chaos Engineering • Kelly Shortridge, Aaron Rinehart & Mark Miller

US Securities and Exchange Commission Chair Gary Gensler | Full Interview | Code 2021

Calculating Risk in the Era of Obscurity: Reading Between the Lines of Security Advisories

Gajendra Deshpande - Deceptive Security using Python

37C3 - Security Nightmares

Everything You Need to Know about Security Issues in Today’s ML Systems | David Glavas

Javascript Should Come With Batteries - Luca Casonato, React Day Berlin 2023

Irene Comalada – DevSecOps, stay away from being in the news

How practical is “DevSecOps” really? – A field report | Maximiliane Zirm

LeadDev San Francisco 2022 Nanzeen Rupawalla

LeadDev Berlin 2022 Lusia Emme

How to Prevent Your Kubernetes Cluster From Being Hacked | Nico Meisenzahl

SAINTCON 2023 - Philip Kemp & Scott Henderson - Beyond the Annual Penetration Test

leyrer: Noch besser leben mit SSH

Building a wallet? Here’s what you need to consider | Kevin Healy, Liam Missim | #LDNBlockchain23