Security conference talks

Roc Alayo Arnabat & Sergi Rosell Ferrer - GitOps in Modern Security-Compliant Environments

Roc Alayo Arnabat & Sergi Rosell Ferrer - GitOps in Modern Security-Compliant Environments

PyData Chicago January 2023 Meetup | Securday: Natural Language Network Scanner

Adelina Simion & Artur Kondas - The shimmy to the left: why security is coming for engineers

Security in Drupal: what can go wrong?

GitHub Advanced Security: Helping Developers Secure the World’s Software • Karl Krukow • GOTO 2023

PAR: Securing the OAuth and OpenID Connect Front-Channel - Dominick Baier - NDC Security 2024

Why Security Is Important in ML and How To Secure Your ML-based Solutions | Rachid Kherrazi

Security Champions? Introduce them in your Organisation | Ives Laaf

Unsafe At Any Speed: CISA's Plan to Foster Tech Ecosystem Security

DevOps Tech: Shifting Left on Security (Presented by: Portshift.io)

Navigating the Cloud Native Security Landscape - Pablo Musa - NDC Porto 2023

Philipp Krenn - Open Policy Agent: security for cloud natives and everyone else

SAINTCON 2016 - Cory Stokes & Derek Larson - Using Security Self Assessment Survey Tools

Protect against unknown security vulnerabilities - Bastian Hofmann

Talks - Nina Zakharenko: Why You Should Care About Open Source Supply Chain Security

SAINTCON 2016 - Sam Mclane - Changing the Economics of Security Operations

Shifting from Syntax to Secure Software Development Processes • Laura Bell Main • YOW! 2023

Introduction to Kubernetes Security - Marc Boorshtein

Why Should Developers Care about Container Security? - Eric Smalling

Say Vulnerabilities One More Time - Ending Open Source Security Fatigue - Alyssa Miller

Catching Commits to Secure Infrastructure as Code • Rosemary Wang • GOTO 2023

Why Security Initiatives Are Doomed to Fail & What You Can Do About It • Josh Armitage • YOW! 2023

Protect Your Code with GitHub Security Features • Rob Bos • GOTO 2023

SHIFT left, not S#!T left - How to launch your shift left security effort | Larry Maccherone

Staying Safe and Secure with Angular | Alisa Duncan | ng-conf Webinar

Forward Focus: Perspectives on AI, Hype, and Security

Adam Števko - Journey to Securing the Cloud: Detecting and Fixing Misconfigurations at Datadog

Getting API security right - Philippe De Ryck - NDC London 2023

Houston, We Have a Problem: Analyzing the Security of Low Earth Orbit Satellites

Security By Design • Ana Oprea • GOTO 2023

Alex Soto - Securing Secrets in the GitOps era

Application Security: Inside Out • Simon Corlett • GOTO 2023

How secure is your build/server? a story of packages and trust

How to Avoid the Top 10 Software Security Flaws • Gary McGraw • YOW! 2018

Open Source Pentesting and Security Analysis Tools: the DevOps way… #slideless

37C3 - Writing secure software

[VDCLUJ22] Laurențiu Spilcă - The new Spring Security

The insecurity of OAuth 2.0 in frontends - Philippe de Ryck - NDC Security 2023

Securing Microservices with Auth0 and MicroProfile in Kubernetes without a hassle | Ondro Mihalyi

Go security pitfalls; 2 lessons from the battlefield at Grafana Labs - Jeremy Matos

Glitched on Earth by Humans: A Black-Box Security Evaluation of the SpaceX Starlink User Terminal

Decoding Modern Tech: Cloud, APIs, Wasm, Security, & More • Daniel Bryant & Matt Turner

Panda to gibbon is the least of your worries: why securing AI is not what you think - Sarah Young

How to Secure Your Node.js Containers on Kubernetes With Best Practices - Deepu K Sasidharan

Badge of Shame: Breaking into Secure Facilities with OSDP

Philipp Krenn - Open Policy Agent: security for cloud natives and everyone else

Adam Števko - Journey to Securing the Cloud: Detecting and Fixing Misconfigurations at Datadog

From Hackathon to Hacked: Web3's Security Journey

Armon Dadgar – Zero Trust Security

Security Best Practices for Django Applications with Gajendra Deshpande - DjangoCon US 2022

Attack on Titan M, Reloaded: Vulnerability Research on a Modern Security Chip

Zero Trust Security for your APIs - Akshata Sawant

Security Through Transparency: Scaling Your Customer Trust Program

SAINTCON 2016 - Kevin Stultz - Docker Container Security

Securing SPAs and Blazor Applications using the BFF (Backend for Frontend) Pattern - Dominick Baier

Defender-Pretender: When Windows Defender Updates Become a Security Risk

Everything You Need to Know about Security Issues in Today’s ML Systems | David Glavas

37C3 - RFC 9420 or how to scale end-to-end encryption with Messaging Layer Security

Calculating Risk in the Era of Obscurity: Reading Between the Lines of Security Advisories

SAINTCON 2023 - Chris Honda - Making Security Happen Without Being A Jerk

SAINTCON 2016 Keynote - Georgia Weidman - Nine years into mobility, has security caught up?

Alex Soto - Securing Secrets in the GitOps era

mc.fly: Perimeter security is dead, get over it.

DPC2021: Securing PHP APIs with Decentralised Identity Tokens - Mohammad Shahbaz Alam

Taking your crypto security to the next level

In Defence of PHP - Stephen Rees-Carter - NDC Security 2023

Java Security & the Java Ecosystem • Nicolas Frankel & Preben Thorø

How to Build a Distributed & Secure Database Ecosystem with PostgreSQL - Trista Pan - PGCon 2022

Google Reimagined a Phone. It was Our Job to Red Team and Secure it.

🚀 Securing Your Infrastructure with Vault (Paul Stack)

Asymmetric Encryption: A Deep Dive - Eli Holderness - NDC Security 2024

SAINTCON 2023 - Chad Walker - Securing Big Stupid Machines

Security Chaos Engineering • Kelly Shortridge, Aaron Rinehart & Mark Miller

Revolutionising Information Security with Blockchain - Certihash Sentinel Node | #LDNBlockchain23

Keynote: How I Met Your Data - Troy Hunt - NDC Security 2024

GNUnet: A network protocol stack for building secure, distributed, and privacy-preserving applicati…

SAINTCON 2016 - Jerry Smith - Privacy and Security : Which comes first?

The Hacker's Guide to JWT Security - Patrycja Wegrzynowicz

Building Secure Microservices in Azure - Jimmy Bogard - NDC London 2023

SAINTCON 2023 - Jesse Harris - DNS as a Security Tool

Over the Air, Under the Radar: Attacking and Securing the Pixel Modem

US Securities and Exchange Commission Chair Gary Gensler | Full Interview | Code 2021

AI Assisted Decision Making of Security Review Needs for New Features

Securing the Supply Chain for Your Java Applications by Thomas Vitale

37C3 - Unlocking Hardware Security: Red Team, Blue Team, and Trojan Tales

Shuffle Up and Deal: Analyzing the Security of Automated Card Shufflers

The Hacker’s Guide to Kubernetes Security by Patrycja Wegrzynowicz

Demystifying Web API Security in Azure - Jimmy Bogard - NDC Sydney 2024

Process Injection: Breaking All macOS Security Layers With a Single Vulnerability

Gajendra Deshpande - Deceptive Security using Python

ElixirConf 2023 - Michael Lubas - Elixir Security: a Business and Technical Perspective

Deputy National Security Advisor, Cyber & Emerging Tech Anne Neuberger | Full Interview | Code 2022

Linux Namespaces for Fun and Isolation - Martin Ertsås - NDC Security 2024

SAINTCON 2023 - Derek Espiritu - Breaking Into Cyber Security

Securing the Future: Balancing Cybersecurity and Innovation. Panel moderated by Elvīra Krēķe

The Integration Cyber Security and Insurance: The Journey of Cysurance

Route to Bugs: Analyzing the Security of BGP Message Parsing

Decoding Modern Tech: Cloud, APIs, Wasm, Security, & More • Daniel Bryant & Matt Turner • GOTO 2023

37C3 - Security Nightmares