{ } Programutvikling
Events and Workshops
In-house
About us
Dark
Light
Filter
Course Calendar
Sort after topic
Jan 23
NDC London 2023
23 - 27 January 2023
100
Speakers
50
Technologies
12
Workshops
95
Talks
Jan 27
How to steal Azure DevOps secrets
Björn Weström
1 hour
Queen Elizabeth II Centre
-
Jan 31
OAuth, OpenID Connect and .NET – the Good Parts
Joe DeCock
1 day
Online
700 USD
Register
Mar 21
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Joe DeCock
3 days
Online (CDT) UTC-5
1 490 USD
Register
May 22
NDC Oslo 2023
22 - 26 May 2023
160
Speakers
45
Technologies
16
Workshops
145
Talks
May 22
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Dominick Baier, Anders Abel
2 days
Oslo Spektrum
11 990 NOK
Register
May 24
TBA - Jim Manico
Jim Manico
1 hour
Oslo Spektrum
-
May 24
TBA - Security
Einar Otto Stangvik
1 hour
Oslo Spektrum
-
Sept 18
NDC TechTown 2023
18 - 21 September 2023
50
Speakers
15
Technologies
10
Workshops
60
Talks
Sept 18
(In)Security in C++
Patricia Aas
2 days
Magazinet Kongsberg
12 490 NOK
Register
Oct 17
NDC Porto 2023
17 - 20 October 2023
80
Speakers
40
Technologies
8
Workshops
90
Talks
On demand courses
Lessons From Billions of Breached Records
Troy Hunt
-
Contact us
OAuth and the long way to Proof of Possession
Dominick Baier, Steinar Noem
-
Contact us
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Anders Abel
-
Contact us
Securing Serverless Applications in Azure
Sjoukje Zaal
-
Contact us
Creating a hybrid and multi-cloud strategy using Azure API Management
Eldert Grootenboer
-
Contact us
Biometric security in the Azure Cloud
Stefano Tempesta
-
Contact us
A Deep Dive Into SameSite Cookies, What They Are and Why They Matter
Stephen Rees-Carter
-
Contact us
The Rise of Software Supply-Chain Attacks – How Secure is your .NET Application?
Niels Tanis
-
Contact us
Demystifying Front-End Security
Ilya Verbitskiy
-
Contact us
Common mistakes and misconceptions in Web Application Security using OAuth 2.0 and OpenId Connect
Nahid Farrokhi
-
Contact us
Using GraphQL as a Secure Innovation Boundary and data-driven culture driver
Rob Moore, Sam Curry, Kieran Jacobsen
-
Contact us
Lightning Talks
Rebecca Platt, Kieran Jacobsen, Emad Alashi, Wing Ho
-
Contact us
The Rise of Software Supply-Chain Attacks – How Secure is your .NET Application?
Niels Tanis
-
Contact us
HTTP Security Headers You Need To Have On Your Web Apps
Scott Sauber
-
Contact us
Service Principals and Managed Identities - the Identity tools every Azure developer should know
Christos Matskas
-
Contact us
How to secure your GitHub Actions
Rob Bos
-
Contact us
Securing Multitenant Databases with Entity Framework Core
Zoran Horvat
-
Contact us
Everything is cyber-broken 3
Scott Helme, Troy Hunt
-
Contact us
How to develop to be compliant with OAuth 2.1 out of the gate
Nahid Farrokhi
-
Contact us
Authentication and Authorization in Blazor
Marco De Sanctis
-
Contact us
Forget about OAuth 2.0. Here comes OAuth 2.1
Philippe De Ryck
-
Contact us
Hack Yourself First: How to go on the Cyber-Offence
Scott Helme
-
Contact us
Securing Serverless Applications in Azure
Sjoukje Zaal
-
Contact us
Passwords are so 1990
Sam Bellen
-
Contact us
Demonstrating binary exploitation with a recent vulnerability
Christian Resell, Marit Iren Rognli Tokle
-
Contact us
Demonstrating binary exploitation with a recent vulnerability
Christian Resell, Marit Iren Rognli Tokle
-
Contact us
Sandboxing a Linux application
Martin Ertsås
-
Contact us
Managing your settings in a secure way using Azure App Configuration
Cecilia Wirén
-
Contact us
Securing your .NET application software supply-chain
Niels Tanis
-
Contact us
HelseID - Introducing Modern Web Security in a Geriatric Health Sector
Dag Helge Østerhagen, Rune Andreas Grimstad
-
Contact us
Implement defence in depth for your .NET API:s
Tobias Ahnoff, Martin Altenstedt
-
Contact us
Using the BFF pattern to secure SPA and Blazor Applications
Dominick Baier
-
Contact us
Securing React with Trusted Types
Philippe De Ryck
-
Contact us
Lightning Talks
Lars Jakobsen, Matěj 'Horm' Horák, Ruby Jane Cabagnot
-
Contact us
Next level security for your Azure applications
Jan de Vries
-
Contact us
Securing your .NET application software supply-chain
Niels Tanis
-
Contact us
Serverless Patterns Made Simple with Real World Usecases
Sheen Brisals
-
Contact us
You Shall Not Password: Modern Authentication for Web Apps
Eli Holderness
-
Contact us
Capture the Flag - Kubernetes Edition - Part I
Andrew Martin
-
Contact us
Awesome Azure Authentication Adventures
Glenn F. Henriksen
-
Contact us
The Abridged History of Application Security
Jim Manico
-
Contact us
Securing SPAs and Blazor Applications using the BFF (Backend for Frontend) Pattern
Dominick Baier
-
Contact us
The Adoption and Operation of Serverless at LEGO.com
Sheen Brisals, Luke Hedger
-
Contact us
The Microsoft Graph: the way to build secure and intelligent apps
Sjoukje Zaal
-
Contact us
Sandboxing .NET assemblies for fun, profit and of course security!
Niels Tanis
-
Contact us
Embrace chaos to achieve stability
René van Osnabrugge
-
Contact us
Application security from start to finish
Michael Kaufmann
-
Contact us
Securing SPAs and Blazor Applications using the BFF (Backend for Frontend) Pattern
Anders Abel
-
Contact us
OAuth – the good Parts
Dominick Baier
-
Contact us
Secure Open Source Practices
Jillian Ratliff
-
Contact us
The OWASP Top Ten 2022 Release
Jim Manico
-
Contact us
The Last XSS Defense Talk
Jim Manico
-
Contact us
Keynote: The Abridged History of Application Security
Jim Manico
-
Contact us
Why you shouldn't trust me
Keerthana Ganesh, Shubham Patil
-
Contact us
How I designed the most efficient deepfake detector in the world with $100
Mathis Hammel
-
Contact us
Web APIs for delightful two factor auth experiences
Phil Nash
-
Contact us
eXential XSS (Cross Site Scripting)
Alex Mackey
-
Contact us
The Return of the Authentication Cookie
Anders Abel
-
Contact us
Defensive Coding Bootcamp
Heather Downing
-
Contact us
Vulnerability Exists Between Keyboard and Chair
Stephen Rees-Carter
-
Contact us
JWT! What is it good for? Absolutely everything (almost)!
Ben Dechrai
-
Contact us
Avoiding DNS Pain
Kieran Jacobsen
-
Contact us
Understanding the Cyber Security Acronym Soup
Kieran Jacobsen
-
Contact us
The Curious Incident in your Software in the Day-Time
Liam Westley
-
Contact us
So long, Secure Coding
Laura Bell
-
Contact us
Developing Flexible Authorisation Capabilities in ASP.NET Core
Jason Taylor
-
Contact us
The Good, the Bad, and the NPM Package: Supply Chain Attacks and How to Protect Your App
Feross Aboukhadijeh
-
Contact us
Smarter Everything with ML & the IoT
Brandon Satrom
-
Contact us
Containers as an Illusion - Part I
Michael Kerrisk
-
Contact us
Signed Integers Considered Harmful
Robert Seacord
-
Contact us
Best-practices for securing your Azure Container Services
Sjoukje Zaal
-
Contact us
Death by downtime
Rune Andreas Grimstad, Dag Helge Østerhagen
-
Contact us
Analysis of Real World Apps with Frida
Kyle Ossinger
-
Contact us
Secret Management: The Soft Way
Lian Li
-
Contact us
What happens if I change this URI… oooooh
Halvor Sakshaug
-
Contact us
Defensive Coding Bootcamp
Heather Downing
-
Contact us
The Hand That Feeds - How to Misuse Kubernetes
Lewis Denham-Parry
-
Contact us
How we secure NAV.no and 1/3 of Norway's national budget
Hans Kristian Flaatten
-
Contact us
Building Secure Microservices in Azure
Jimmy Bogard
-
Contact us
Formal verification of C# smart contracts
Allister Beharry
-
Contact us
You Shall Not Password: Modern Authentication for Web Apps
Eli Holderness
-
Contact us
Vulnerability Exists Between Keyboard and Chair
Stephen Rees-Carter
-
Contact us
Forget about OAuth 2.0. Here comes OAuth 2.1
Philippe De Ryck
-
Contact us
OAuth – the good Parts
Anders Abel
-
Contact us
Lightning Talks
Iryna Zelenetska, Hallstein Brøtan, Einar Høst
-
Contact us
Sandboxing .NET assemblies for fun, profit and of course security!
Niels Tanis
-
Contact us
Securing your .NET application software supply-chain
Niels Tanis
-
Contact us
The state of passwordless auth on the web
Phil Nash
-
Contact us
JWT! What is it good for? Absolutely everything (almost)!
Ben Dechrai
-
Contact us
So long, Secure Coding
Laura Bell
-
Contact us
Cyber Broken
Scott Helme
-
Contact us
From Application Security to Developer Security – Shift left with GitHub Advanced Security
Michael Kaufmann
-
Contact us
Part 1/2: How to use Microsoft's Graph API
George Coldham, Michelle Sandford
-
Contact us
NOPASSWD: Building a Passwordless Cloud Infrastructure
Kyle Kotowick
-
Contact us
Securing your .NET application software supply-chain, the practical approach!
Niels Tanis
-
Contact us
Developing Flexible Authorisation Capabilities in ASP.NET Core
Jason Taylor
-
Contact us
Getting API security right
Philippe De Ryck
-
Contact us
Defensive Coding Bootcamp
Heather Downing
-
Contact us
Return Oriented Programming, an introduction
Patricia Aas
-
Contact us
Hyper Speed! When Big Data Blooms
Scott Helme
-
Contact us
Secure Coding in C and C++
Robert Seacord
-
Contact us
Defending Kubernetes Environments: A Hands-On Approach
Jimmy Mesta
-
Contact us
(In)Secure C++: Sec Edition
Patricia Aas
-
Contact us
Part 2/2: How to use Microsoft's Graph API
Michelle Sandford, George Coldham
-
Contact us
High Security OAuth
Dominick Baier, Brock Allen
-
Contact us
Secure Programming for the Enterprise in .NET, .NET Core and Future
Stephen Haunts
-
Contact us
GitHub + Azure: Better Together!
April Edwards
-
Contact us
A builder’s guide to Single Page Application security
Philippe De Ryck
-
Contact us
Workshop: Securing (and Observing) Kubernetes clusters with Cilium and eBPF - Part 2/2
Hans Kristian Flaatten, Øyvind Randa
-
Contact us
Building Secure API's and Web Applications
Philippe De Ryck
-
Contact us
The Hows and Whys of Running Our Own OpenidConnect Identity Provider
Roland Guijt
-
Contact us
TLS/HTTPS Security for Web Developers
Scott Helme
-
Contact us
How AI is impacting cybersecurity. Does it?
Victoria Almazova
-
Contact us
Keynote: Crypto means Cryptography!
Scott Helme
-
Contact us
Build your own application security program
Laura Bell
-
Contact us
A Builder's Guide to Securing Modern Applications
Philippe De Ryck
-
Contact us
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Brock Allen, Joe DeCock
-
Contact us
Hyper Speed! When Big Data Blooms
Scott Helme
-
Contact us
Building Secure API's and Web Applications
Jim Manico
-
Contact us
Secure Programming for the Enterprise in .NET Framework / .NET Core
Stephen Haunts
-
Contact us
OAuth, OpenID Connect & .NET – the Good Parts
Dominick Baier
-
Contact us
Secure Coding in C and C++
Robert Seacord
-
Contact us
API security for developers
Philippe De Ryck
-
Contact us
OAuth in 2021 – What’s up?
Dominick Baier
-
Contact us
Secure Programming for the Enterprise in .NET and .NET Core
Stephen Haunts
-
Contact us
Advanced Security Design: Threat Modeling Masterclass
Avi Douglen
-
Contact us
Getting API security right
Philippe De Ryck
-
Contact us
(In)Security in C++
Patricia Aas
-
Contact us
Workshop: Securing (and Observing) Kubernetes clusters with Cilium and eBPF - Part 1/2
Hans Kristian Flaatten, Øyvind Randa
-
Contact us
Keynote: Unicorn Hunting
Mikko Hypponen
-
Contact us
Threat Assessment for Software Architects
Erica Anderson, Laura Bell
-
Contact us
The OWASP Top Ten for Developers
Jim Manico
-
Contact us
Building Scalable and Maintainable APIs with ASP.NET Core Workshop
Spencer Schneidenbach
-
Contact us
Batten Down the Hatches! A Cluster Security Journey
Jimmy Mesta, Steve Wade
-
Contact us
Creating a hybrid and multi-cloud strategy using Azure API Management
Eldert Grootenboer
-
Contact us
TBA - Troy Hunt
Troy Hunt
-
Contact us
Linux Security and Isolation APIs Fundamentals
Michael Kerrisk
-
Contact us
Programutvikling uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it