{ } Programutvikling
Events and Workshops
In-house
About us
Dark
Light
Filter
Course Calendar
Sort after topic
May 19
NDC Oslo 2025
19 - 23 May 2025
150
Speakers
45
Technologies
20
Workshops
160
Talks
Sept 8
NDC Copenhagen 2025
8 - 12 September 2025
100
Speakers
40
Technologies
100
Talks
10
Workshops
Sept 22
NDC TechTown 2025
22 - 25 September 2025
50
Speakers
15
Technologies
10
Workshops
60
Talks
Oct 13
Azure Dev Summit 2025
13 - 16 October 2025
Oct 20
NDC Porto 2025
20 - 24 October 2025
80
Speakers
40
Technologies
8
Workshops
90
Talks
Nov 11
NDC AI 2025
11 - 13 November 2025
Dec 1
NDC Manchester 2025
1 - 4 December 2025
40
Speakers
50
Sessions
8
Workshops
20
Technologies
Dec 1
Agile Whiteboard Hacking – aka Hands-on Threat Modeling
Georges Bolssens
2 days
Hilton Deansgate
890 GBP
Register
Jan 26
NDC London 2026
26 - 30 January 2026
100
Speakers
50
Technologies
12
Workshops
110
Talks
Mar 2
NDC Security Oslo 2026
2 - 5 March 2026
50
Speakers
Technologies
8
Workshops
60
Talks
On demand courses
Part 2: Securing Kubernetes: Practical Workflows and Tools for Enhanced Cluster Protection
Rabieh Fashwall
-
Contact us
Flipping Bits: Your Credentials Are Certainly Mine
Stök ., Joona Hoikkala
-
Contact us
What I learnt about automating security
George Coldham
-
Contact us
NOPASSWD: Building a Passwordless Cloud Infrastructure
Kyle Kotowick
-
Contact us
OPA everywhere! Exploring new opportunities in policy evaluation
Anders Eknert
-
Contact us
How hacking works - Web Edition
Espen Sande-Larsen
-
Contact us
Securely deploying Infrastructure as Code
Chris Ayers
-
Contact us
Hacker vs Azure Web Application Firewall
Laura Kokkarinen
-
Contact us
Surprising ways to escalate privileges in Entra ID
Marius Solbakken Mellum
-
Contact us
Automating security monitoring
Truls Dahlsveen
-
Contact us
AWS Security Reference Architecture: Visualize your security
Mohamed Wali
-
Contact us
The Top 10 List of Istio Security Risks and Mitigation Strategies
José Carlos Chávez
-
Contact us
Optimizing Cloud Detection & Response With Security Chaos Engineering
Kennedy Torkura
-
Contact us
Effects Malware hunting in Cloud environment
Filipi Pires
-
Contact us
Microsoft Security Copilot - your new best friend!
George Coldham
-
Contact us
Tune your Toolbox for Velocity and Value
Josh Grossman
-
Contact us
Detect threats and misconfigurations in your GCP environment and operationalize on findings
Brian Jung
-
Contact us
TPMs and the Linux Kernel: unlocking a better path to hardware security
Ignat Korchagin
-
Contact us
The Hidden Dangers of Incoherent Code: How Code Quality Impacts Security
Tav Herzlich
-
Contact us
Inside Google's Discovery and Remediation of a Critical CPU Vulnerability
Yousif Hussin
-
Contact us
Part 1: Securing Kubernetes: Practical Workflows and Tools for Enhanced Cluster Protection
Rabieh Fashwall
-
Contact us
Container Security with Falco: A Quick Start Guide
Ayesha Kaleem
-
Contact us
LIVE DEMO: Supply Chain Attacks in the Terraform Registry
Kyle Kotowick
-
Contact us
Start covering your bases & Stop chasing APT headlines
Avishay Zawoznik
-
Contact us
Privilege Escalation in Microsoft Azure
Christian August Holm Hansen
-
Contact us
GitHub Actions: A Cloudy Day for Security
Sofia Lindqvist
-
Contact us
Tales of OAuth2/OIDC in the wild
Anders Abel
-
Contact us
NDC Party - Conference Reception + Panel: Will Application Security eat Cloud Security for lunch?
Shilpi Bhattacharjee, Tanya Janca, Ashish Rajan
-
Contact us
Programutvikling uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it