{ } Programutvikling
Events and Workshops
In-house
About us
Dark
Light
Filter
Course Calendar
Sort after topic
Jan 20
NDC Security 2025
20 - 23 January 2025
40
Speakers
20
Technologies
8
Workshops
50
Talks
Jan 20
AI Red Teaming in Practice
Amanda Minnich (AIRT), Gary Lopez
2 days
Radisson Blu Scandinavia Hotel
15 990 NOK
Register
Jan 20
Agile Whiteboard Hacking – aka Hands-on Threat Modeling
Sebastien Deleersnyder
2 days
Radisson Blu Scandinavia Hotel
15 990 NOK
Register
Jan 22
Keynote: Maturing Your Application Security Program
Tanya Janca
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 22
Securing React: Prompt Engineering for Robust and Secure Code Generation
Jim Manico
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 22
Building antifragile systems using Secure by Design
Anders Kofoed, Eivind Jahr Kirkeby
1 hour
-
Jan 22
Practical cryptography with Tink
Neil Madden
1 hour
-
Jan 22
Part 1: Stop Firefighting Vulnerabilities, Start Eliminating Bug Classes at Scale: A Hands-On Workshop
Javan Rasokat
1 hour
-
Jan 22
I don't need privacy, I got confidentiality!
Kim Wuyts
1 hour
-
Jan 22
Part 2: Stop Firefighting Vulnerabilities, Start Eliminating Bug Classes at Scale: A Hands-On Workshop
Javan Rasokat
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 22
Improve your threat modelling through the science of simplicity
Dave Soldera
1 hour
-
Jan 22
Using GenAI on your code, what could possibly go wrong?
Niels Tanis
1 hour
-
Jan 22
Using developer-centric data to predict, prioritize, and improve Application Security Outcomes
Laura Bell
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 22
Secure System Integrations
Tobias Ahnoff
1 hour
-
Jan 22
(Ab)user Experience: The dark side of Product and Security
Lianne Potter, Jeff Watkins
1 hour
-
Jan 22
Flipping Bits: Your Credentials Are Certainly Mine
Stök ·, Joona Hoikkala
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 23
Inside Google's Discovery and Remediation of a Critical CPU Vulnerability
Yousif Hussin
1 hour
-
Jan 23
Tales of OAuth2/OIDC in the wild
Anders Abel
1 hour
-
Jan 23
Breaking and securing OAuth 2.0 in frontends at NDC Security
Philippe De Ryck
1 hour
-
Jan 23
Advanced Malware Analysis Techniques – Unmasking Hidden Threats
Ankshika Maunthrooa
1 hour
-
Jan 23
From DevSecOops to Security Success: The Bug Bounty Effect at FINN.no
Emil Vaagland
1 hour
-
Jan 23
Security Champion Worst Practices
Tanya Janca
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 23
Without a Trace: Supply Chain Attacks in the Terraform Registry
Kyle Kotowick
1 hour
-
Jan 23
Challenges and Opportunities from Quantum-Safe Cryptography
Tjerand Silde
1 hour
-
Jan 23
Content Security Policy: From newbie to advanced
Halvor Sakshaug
1 hour
-
Jan 23
RCE via legacy dependency in Python
Andrea Brambilla
1 hour
-
Jan 27
NDC London 2025
27 - 31 January 2025
100
Speakers
50
Technologies
12
Workshops
110
Talks
Apr 29
NDC Melbourne 2025
29 April - 1 May 2025
40
Speakers
30
Technologies
10
Workshops
50
Talks
May 19
NDC Oslo 2025
19 - 23 May 2025
150
Speakers
45
Technologies
20
Workshops
160
Talks
Sept 8
Copenhagen Developers Festival 2025
8 - 12 September 2025
100
Speakers
5
Bands
100
Talks
10
Workshops
Sept 22
NDC TechTown 2025
22 - 25 September 2025
50
Speakers
15
Technologies
10
Workshops
60
Talks
On demand courses
Improving the Chances of Success in Secure Software Development
Daniela Cruzes, Espen Agnalt Johansen
-
Contact us
What I learnt about automating security
George Coldham
-
Contact us
Test Driven Application Security
Tobias Ahnoff, Martin Altenstedt
-
Contact us
Is this okay!? How to review code for security issues.
Rouan Wilsenach
-
Contact us
Using WebAssembly to run, extend, and secure your .NET application
Niels Tanis
-
Contact us
Defendable Products: How we try to improve security in our products
Ståle Pettersen
-
Contact us
OPA everywhere! Exploring new opportunities in policy evaluation
Anders Eknert
-
Contact us
Attacking through the Software Supply Chain
Felix Leder
-
Contact us
Running system tests with active authn/z
Lars Skjorestad
-
Contact us
A data driven approach to application security
Petter Kvalvaag, Kristian Reed
-
Contact us
How hacking works - Web Edition
Espen Sande-Larsen
-
Contact us
Building a sustainable security requirements process with the ASVS
Josh Grossman
-
Contact us
In Defence of PHP
Stephen Rees-Carter
-
Contact us
What happens if I change this URI… oooooh
Halvor Sakshaug
-
Contact us
Cyber Security vs. Statistics: Fighting False Positives to Automate your Security Operations
Christopher Van Der Made
-
Contact us
Security as Code: A DevSecOps Approach
Joseph Katsioloudes
-
Contact us
Block DNS exfiltration with L7 filter
Magnus Longva
-
Contact us
Hacker vs Azure Web Application Firewall
Laura Kokkarinen
-
Contact us
Developing secure software with GitHub
Laura Kokkarinen, Thomas Vochten
-
Contact us
Assessing NuGet Packages more easily with Security Scorecards
Niels Tanis
-
Contact us
Code Security Reinvented: Navigating the era of AI
Joseph Katsioloudes
-
Contact us
Panda to gibbon is the least of your worries: why securing AI is not what you think
Sarah Young
-
Contact us
Supply Chain Attacks:- Focused on NPM attacks. (Includes, demonstrations of research and prevention
Danish Tariq
-
Contact us
Detecting Malicious Activity: Unveiling the Secrets of MS-SQL Logging
Tristan Bennett
-
Contact us
Effects Malware hunting in Cloud environment
Filipi Pires
-
Contact us
Prompt Injection: When Hackers Befriend Your AI
Vetle Hjelle
-
Contact us
Sandboxing in Linux with zero lines of code
Ignat Korchagin
-
Contact us
Second Breakfast: Implicit and Mutation-Based Serialization Vulnerabilities in .NET
Jonathan Birch
-
Contact us
OWASP Juice Shop - An Open Source Software and security Fairytale
Björn Kimminich
-
Contact us
Passwords are Dead, Long live Passkeys!
Stephen Rees-Carter
-
Contact us
OAuth2/OIDC security weaknesses and pitfalls
Tobias Ahnoff, Pontus Hanssen
-
Contact us
Passwords don't have to be so hard!
Stefán Jökull Sigurðarson
-
Contact us
The Hidden Risk in Undocumented API Behavior
Bahaa Naamneh
-
Contact us
No Size Fits All: Empowering Engineers with Custom Application Security tests
Michal Kamensky
-
Contact us
Threat Modelling for ML/AI systems
Andrea Brambilla, Benjamin Løkling
-
Contact us
Part 1/2: Hands-on grand tour of GPU Graph AI for security event correlation
Leo Meyerovich, Alex Morrise
-
Contact us
Incidents and incident handling @ VG.no
Audun Ytterdal
-
Contact us
Part 2/2: Hands-on grand tour of GPU Graph AI for security event correlation
Leo Meyerovich, Alex Morrise
-
Contact us
Container Security with Falco: A Quick Start Guide
Ayesha Kaleem
-
Contact us
Building a High-Value AppSec Scanning Programme
Josh Grossman
-
Contact us
Purple is the New Black: Modern Approaches to Application Security
Tanya Janca
-
Contact us
PAR: Securing the OAuth and OpenID Connect Front-Channel
Dominick Baier
-
Contact us
NDC Party - Conference Reception + Panel: Will Application Security eat Cloud Security for lunch?
Shilpi Bhattacharjee, Tanya Janca, Ashish Rajan
-
Contact us
Programutvikling uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it