{ } Programutvikling
Events and Workshops
In-house
About us
Dark
Light
Filter
Course Calendar
Sort after topic
Jan 20
NDC Security 2025
20 - 23 January 2025
40
Speakers
20
Technologies
8
Workshops
50
Talks
Jan 20
Hack Yourself First: How to go on the Cyber-Offence
Scott Helme
2 days
Radisson Blu Scandinavia Hotel
15 990 NOK
Register
Jan 20
Bulletproof APIs: Hands-On API Security
Philippe De Ryck
2 days
Radisson Blu Scandinavia Hotel
15 990 NOK
Register
Jan 20
(In)Secure C++: Sec Edition
Patricia Aas
2 days
Radisson Blu Scandinavia Hotel
15 990 NOK
Register
Jan 20
Application Security in AI Prompt Engineering
Jim Manico
2 days
Radisson Blu Scandinavia Hotel
15 990 NOK
Register
Jan 20
Identity & Access Control for modern Applications and APIs using ASP.NET 9
Anders Abel
2 days
Radisson Blu Scandinavia Hotel
15 990 NOK
Register
Jan 20
Linux Security and Isolation APIs Fundamentals
Michael Kerrisk
2 days
Radisson Blu Scandinavia Hotel
15 990 NOK
Register
Jan 22
Using developer-centric data to predict, prioritize, and improve Application Security Outcomes
Laura Bell
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 23
Placeholder - Victoria Almazova
Victoria Almazova
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 27
NDC London 2025
27 - 31 January 2025
100
Speakers
50
Technologies
12
Workshops
110
Talks
Jan 30
Fine-Grained Authorization for Modern Applications
Ashish Jha
1 hour
-
Jan 30
Asymmetric Encryption: A Deep Dive
Eli Holderness
1 hour
-
Jan 30
Inside Google's Discovery and Remediation of a Critical CPU Vulnerability
Yousif Hussin
1 hour
-
Jan 30
So Long Secure Coding - Practical Steps for Securing the entire SDLC
Laura Bell
1 hour
Queen Elizabeth II Centre
-
Jan 30
Post-quantum cryptography for .NET developers
Filip W.
1 hour
-
Jan 30
Secure your Modular Monolith by pretending it's a cat
William Brander
1 hour
-
Apr 29
NDC Melbourne 2025
29 April - 1 May 2025
40
Speakers
30
Technologies
10
Workshops
50
Talks
Apr 30
Placeholder Troy Hunt
Troy Hunt
1 hour
Melbourne Convention and Exhibition Centre (MCEC)
-
May 19
NDC Oslo 2025
19 - 23 May 2025
150
Speakers
45
Technologies
20
Workshops
160
Talks
May 19
Securing your .NET application software supply-chain
Niels Tanis
2 days
Oslo Spektrum
13 990 NOK
Register
May 19
Bulletproof APIs: Hands-On API Security
Philippe De Ryck
2 days
Oslo Spektrum
13 990 NOK
Register
Sept 8
Copenhagen Developers Festival 2025
8 - 12 September 2025
100
Speakers
5
Bands
100
Talks
10
Workshops
Sept 22
NDC TechTown 2025
22 - 25 September 2025
50
Speakers
15
Technologies
10
Workshops
60
Talks
On demand courses
TPMs and the Linux Kernel: unlocking a better path to hardware security
Ignat Korchagin
-
Contact us
Lessons From Billions of Breached Records
Troy Hunt
-
Contact us
OAuth and the long way to Proof of Possession
Dominick Baier, Steinar Noem
-
Contact us
Identity & Access Control for modern Applications and APIs using ASP.NET Core 8
Anders Abel
-
Contact us
Improving our safety with a quantities and units library
Mateusz Pusz
-
Contact us
Securing Serverless Applications in Azure
Sjoukje Zaal
-
Contact us
Creating a hybrid and multi-cloud strategy using Azure API Management
Eldert Grootenboer
-
Contact us
Biometric security in the Azure Cloud
Stefano Tempesta
-
Contact us
A Deep Dive Into SameSite Cookies, What They Are and Why They Matter
Stephen Rees-Carter
-
Contact us
The Rise of Software Supply-Chain Attacks – How Secure is your .NET Application?
Niels Tanis
-
Contact us
Demystifying Front-End Security
Ilya Verbitskiy
-
Contact us
Common mistakes and misconceptions in Web Application Security using OAuth 2.0 and OpenId Connect
Nahid Farrokhi
-
Contact us
Using GraphQL as a Secure Innovation Boundary and data-driven culture driver
Rob Moore, Sam Curry, Kieran Jacobsen
-
Contact us
Lightning Talks
Rebecca Platt, Kieran Jacobsen, Emad Alashi, Wing Ho
-
Contact us
The Rise of Software Supply-Chain Attacks – How Secure is your .NET Application?
Niels Tanis
-
Contact us
HTTP Security Headers You Need To Have On Your Web Apps
Scott Sauber
-
Contact us
Service Principals and Managed Identities - the Identity tools every Azure developer should know
Christos Matskas
-
Contact us
How to secure your GitHub Actions
Rob Bos
-
Contact us
Securing Multitenant Databases with Entity Framework Core
Zoran Horvat
-
Contact us
Everything is cyber-broken 3
Scott Helme, Troy Hunt
-
Contact us
How to develop to be compliant with OAuth 2.1 out of the gate
Nahid Farrokhi
-
Contact us
Authentication and Authorization in Blazor
Marco De Sanctis
-
Contact us
Forget about OAuth 2.0. Here comes OAuth 2.1
Philippe De Ryck
-
Contact us
Securing Serverless Applications in Azure
Sjoukje Zaal
-
Contact us
Passwords are so 1990
Sam Bellen
-
Contact us
Demonstrating binary exploitation with a recent vulnerability
Christian Resell, Marit Iren Rognli Tokle
-
Contact us
Demonstrating binary exploitation with a recent vulnerability
Christian Resell, Marit Iren Rognli Tokle
-
Contact us
Sandboxing a Linux application
Martin Ertsås
-
Contact us
Managing your settings in a secure way using Azure App Configuration
Cecilia Wirén
-
Contact us
Securing your .NET application software supply-chain
Niels Tanis
-
Contact us
HelseID - Introducing Modern Web Security in a Geriatric Health Sector
Dag Helge Østerhagen, Rune Andreas Grimstad
-
Contact us
Implement defence in depth for your .NET API:s
Tobias Ahnoff, Martin Altenstedt
-
Contact us
Using the BFF pattern to secure SPA and Blazor Applications
Dominick Baier
-
Contact us
Securing React with Trusted Types
Philippe De Ryck
-
Contact us
Lightning Talks
Lars Jakobsen, Matěj 'Horm' Horák, Ruby Jane Cabagnot
-
Contact us
Next level security for your Azure applications
Jan de Vries
-
Contact us
Securing your .NET application software supply-chain
Niels Tanis
-
Contact us
Serverless Patterns Made Simple with Real World Usecases
Sheen Brisals
-
Contact us
You Shall Not Password: Modern Authentication for Web Apps
Eli Holderness
-
Contact us
Capture the Flag - Kubernetes Edition - Part I
Andrew Martin
-
Contact us
Awesome Azure Authentication Adventures
Glenn F. Henriksen
-
Contact us
The Abridged History of Application Security
Jim Manico
-
Contact us
Securing SPAs and Blazor Applications using the BFF (Backend for Frontend) Pattern
Dominick Baier
-
Contact us
The Adoption and Operation of Serverless at LEGO.com
Sheen Brisals, Luke Hedger
-
Contact us
The Microsoft Graph: the way to build secure and intelligent apps
Sjoukje Zaal
-
Contact us
Sandboxing .NET assemblies for fun, profit and of course security!
Niels Tanis
-
Contact us
Embrace chaos to achieve stability
René van Osnabrugge
-
Contact us
Application security from start to finish
Michael Kaufmann
-
Contact us
Securing SPAs and Blazor Applications using the BFF (Backend for Frontend) Pattern
Anders Abel
-
Contact us
OAuth – the good Parts
Dominick Baier
-
Contact us
Secure Open Source Practices
Jillian Ratliff
-
Contact us
Mastering the 2022 OWASP Top Ten with Jim Manico
Jim Manico
-
Contact us
The Last XSS Defense Talk
Jim Manico
-
Contact us
Keynote: The Abridged History of Application Security
Jim Manico
-
Contact us
Why you shouldn't trust me
Keerthana Ganesh, Shubham Patil
-
Contact us
How I designed the most efficient deepfake detector in the world with $100
Mathis Hammel
-
Contact us
Web APIs for delightful two factor auth experiences
Phil Nash
-
Contact us
eXential XSS (Cross Site Scripting)
Alex Mackey
-
Contact us
The Return of the Authentication Cookie
Anders Abel
-
Contact us
Defensive Coding Bootcamp
Heather Downing
-
Contact us
Vulnerability Exists Between Keyboard and Chair
Stephen Rees-Carter
-
Contact us
JWT! What is it good for? Absolutely everything (almost)!
Ben Dechrai
-
Contact us
Avoiding DNS Pain
Kieran Jacobsen
-
Contact us
Understanding the Cyber Security Acronym Soup
Kieran Jacobsen
-
Contact us
The Curious Incident in your Software in the Day-Time
Liam Westley
-
Contact us
So long, Secure Coding
Laura Bell
-
Contact us
Developing Flexible Authorisation Capabilities in ASP.NET Core
Jason Taylor
-
Contact us
The Good, the Bad, and the NPM Package: Supply Chain Attacks and How to Protect Your App
Feross Aboukhadijeh
-
Contact us
Smarter Everything with ML & the IoT
Brandon Satrom
-
Contact us
Containers as an Illusion - Part I
Michael Kerrisk
-
Contact us
Signed Integers Considered Harmful
Robert Seacord
-
Contact us
Best-practices for securing your Azure Container Services
Sjoukje Zaal
-
Contact us
Death by downtime
Rune Andreas Grimstad, Dag Helge Østerhagen
-
Contact us
Analysis of Real World Apps with Frida
Kyle Ossinger
-
Contact us
Secret Management: The Soft Way
Lian Li
-
Contact us
What happens if I change this URI… oooooh
Halvor Sakshaug
-
Contact us
Defensive Coding Bootcamp
Heather Downing
-
Contact us
The Hand That Feeds - How to Misuse Kubernetes
Lewis Denham-Parry
-
Contact us
How we secure NAV.no and 1/3 of Norway's national budget
Hans Kristian Flaatten
-
Contact us
Building Secure Microservices in Azure
Jimmy Bogard
-
Contact us
Formal verification of C# smart contracts
Allister Beharry
-
Contact us
You Shall Not Password: Modern Authentication for Web Apps
Eli Holderness
-
Contact us
Vulnerability Exists Between Keyboard and Chair
Stephen Rees-Carter
-
Contact us
Forget about OAuth 2.0. Here comes OAuth 2.1
Philippe De Ryck
-
Contact us
OAUTH, OPENID CONNECT & .NET – THE GOOD PARTS
Anders Abel
-
Contact us
Lightning Talks
Iryna Zelenetska, Hallstein Brøtan, Einar Høst
-
Contact us
Sandboxing .NET assemblies for fun, profit and of course security!
Niels Tanis
-
Contact us
Securing your .NET application software supply-chain
Niels Tanis
-
Contact us
Part 1/2: Build your own Secure Messenger
Ben Dechrai
-
Contact us
The state of passwordless auth on the web
Phil Nash
-
Contact us
JWT! What is it good for? Absolutely everything (almost)!
Ben Dechrai
-
Contact us
So long, Secure Coding
Laura Bell
-
Contact us
Supercharging OAuth 2.0 Security
Philippe De Ryck
-
Contact us
Cyber Broken
Scott Helme
-
Contact us
From Application Security to Developer Security – Shift left with GitHub Advanced Security
Michael Kaufmann
-
Contact us
How to steal Azure DevOps secrets
Björn Weström
-
Contact us
Part 1/2: How to use Microsoft's Graph API
George Coldham, Michelle Sandford
-
Contact us
NOPASSWD: Building a Passwordless Cloud Infrastructure
Kyle Kotowick
-
Contact us
Securing your .NET application software supply-chain, the practical approach!
Niels Tanis
-
Contact us
Developing Flexible Authorisation Capabilities in ASP.NET Core
Jason Taylor
-
Contact us
Getting API security right
Philippe De Ryck
-
Contact us
Defensive Coding Bootcamp
Heather Downing
-
Contact us
Return Oriented Programming, an introduction
Patricia Aas
-
Contact us
Hyper Speed! When Big Data Blooms
Scott Helme
-
Contact us
Part 2/2: Build your own Secure Messenger
Ben Dechrai
-
Contact us
Secure Coding in C and C++
Robert Seacord
-
Contact us
C++ Best Practices
Jason Turner
-
Contact us
Defending Kubernetes Environments: A Hands-On Approach
Jimmy Mesta
-
Contact us
Hacked on national television
Linus Kvarnhammar
-
Contact us
What the Premier League can teach us about Zero Trust Security
Michal Davidson
-
Contact us
Build a Secure Developer Platform Using Argo, Istio and Vault.
Jona Apelbaum, Alessandro Vozza
-
Contact us
NOPASSWD: Building a Passwordless Cloud Infrastructure
Kyle Kotowick
-
Contact us
How hacking works - Web edition
Espen Sande-Larsen
-
Contact us
Don't Panic: A Developer's Guide to Building Secure GraphQL APIs
Meenakshi Dhanani
-
Contact us
Don’t Throw Away the Key: What Developers Should Know about Encryption
Liz Moy
-
Contact us
CDNs 101: An Introduction to Content Delivery Networks
Jake Ginnivan
-
Contact us
Automating your DNS
Vatsalya Goel
-
Contact us
OAuth2 on a national level - how to secure extremely sensitive apis
Rune Andreas Grimstad
-
Contact us
Emerging threats against cloud application identities and what you should do about it
Sarah Young
-
Contact us
Stories from DART: Taking the ware out of ransomware
Sarah Young
-
Contact us
How hacking works
Espen Sande-Larsen
-
Contact us
Part 1/2: Securing Container Supply Chain Workshop
Hans Kristian Flaatten, Jan-Kåre Solbakken, Youssef Bel Mekki
-
Contact us
Flexible Authorisation with ASP.NET Core 7.0
Jason Taylor
-
Contact us
Abusing GitHub for fun and profit: Actions and Codespaces Security
Magno Logan, Nitesh Surana
-
Contact us
AI for Inclusive Society - Responsible AI
Yashoda Singh
-
Contact us
Did I break prod?
Ewelina Wilkosz
-
Contact us
How complex software impacts your cognitive abilities
Corstian Boerman
-
Contact us
Are your secrets secure? - How mobile applications are leaking millions of credentials
Mackenzie Jackson
-
Contact us
Monorepo – How to do frontend faster, better and safer
Kari Meling Johannessen
-
Contact us
Warpforge: Decentralized supply chain management for building... Everything!
Eric Myhre
-
Contact us
Transformation Blueprint for Developer-Centric Application Security
Larry Maccherone
-
Contact us
OAuth and Proof of Possession - The long way round
Dominick Baier
-
Contact us
The Future of Cookies
Anders Abel
-
Contact us
How AI is impacting cybersecurity. Does it?
Victoria Almazova
-
Contact us
Part 2/2: Securing Container Supply Chain Workshop
Hans Kristian Flaatten, Jan-Kåre Solbakken, Youssef Bel Mekki
-
Contact us
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
Scott Helme
-
Contact us
Lightning Talks 3
Erik André Jakobsen, Tor Kristen Haugen
-
Contact us
Quantum Computing and the future of cryptography
Filip W.
-
Contact us
Human vs AI: How to ship secure code
Joseph Katsioloudes
-
Contact us
Connect remotely like a pro! Hack VPNs, avoid firewalls, connect even when your machine is down
Adam Furmanek
-
Contact us
An engineer's guide to Linux Kernel upgrades
Ignat Korchagin
-
Contact us
What is Linux kernel keystore and why you should use it in your next application
Ignat Korchagin
-
Contact us
You Shall Not Password: Modern Authentication for Web Apps
Eli Holderness
-
Contact us
(In)Secure C++: Sec Edition
Patricia Aas
-
Contact us
Part 1/2: Securing your .NET application software supply-chain, the practical approach!
Niels Tanis
-
Contact us
Using WebAssembly to run, extend, and secure your .NET application
Niels Tanis
-
Contact us
SLSA, SigStore, SBOM and Software Supply Chain Security. What does that all mean really ?
Abdel Sghiouar
-
Contact us
GitHub + Azure: Better Together!
April Edwards
-
Contact us
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
Scott Helme
-
Contact us
Safer C++ with MISRA-C++ 2023
Peter Sommerlad
-
Contact us
Secure development with C++ - Lessons and techniques
Helge Penne
-
Contact us
Keynote: Safety and Security: The Future of C and C++
Robert Seacord
-
Contact us
Access control in message-driven systems
Marc Klefter
-
Contact us
Part 2/2: How to use Microsoft's Graph API
Michelle Sandford, George Coldham
-
Contact us
High Security OAuth
Dominick Baier, Brock Allen
-
Contact us
Navigating the Cloud Native Security Landscape
Pablo Musa
-
Contact us
Compliance & Regulatory Standards Are NOT Incompatible With Modern Development Best Practices
Charity Majors
-
Contact us
Part 2/2: Securing your .NET application software supply-chain, the practical approach!
Niels Tanis
-
Contact us
Panda to gibbon is the least of your worries: why securing AI is not what you think
Sarah Young
-
Contact us
52 mins from initial access to ransomware -- is your defensive team ready?
Maarten Goet
-
Contact us
2FA2Furious: New Threats to MFA
Nathaniel Okenwa
-
Contact us
Using Intent Based Access Control to Achieve Zero-Trust Deployments
David G. Simmons
-
Contact us
Drones, RemoteID and the Thrilling Future of UAS Flight
Heather Downing
-
Contact us
Not all attacks are malicious: DDoS from outside and within
Ingrid Guren, John Arne S. Pedersen
-
Contact us
The Future of Cookies
Anders Abel
-
Contact us
Keep your nose out of it. Denying yourself access to production
Glenn F. Henriksen
-
Contact us
Secure Programming for the Enterprise in .NET, .NET Core and Future
Stephen Haunts
-
Contact us
Unlocking The Secrets Of TLS
Scott Helme
-
Contact us
Keynote: How I Met Your Data
Troy Hunt
-
Contact us
I Connected My Farm To The Internet. Now What?
Lars Klint
-
Contact us
Secure AI: Integrating OWASP Principles in Machine Learning Model Development
Haritha Thilakarathne
-
Contact us
Build your own Secure Messenger
Ben Dechrai
-
Contact us
Microsoft Security Copilot - your new best friend!
George Coldham
-
Contact us
Drones, RemoteID and the Thrilling Future of UAS Flight
Heather Downing
-
Contact us
Going production scale with Gen AI - Patterns for your API
Scott Holden
-
Contact us
GitHub + Azure: Better Together!
April Edwards
-
Contact us
A builder’s guide to Single Page Application security
Philippe De Ryck
-
Contact us
Reviewing NuGet Packages security easily using OpenSSF Scorecard
Niels Tanis
-
Contact us
Maximising Security with Threat Modelling in the Cloud
Romina Druta, Daniela Cruzes
-
Contact us
Workshop: Securing (and Observing) Kubernetes clusters with Cilium and eBPF - Part 2/2
Hans Kristian Flaatten, Øyvind Randa
-
Contact us
Building Secure API's and Web Applications
Philippe De Ryck
-
Contact us
Using AI for Secure Code Creation: Enhancing Software Security
Jim Manico
-
Contact us
Awesome Azure Authentication Adventures
Glenn F. Henriksen
-
Contact us
The Hows and Whys of Running Our Own OpenidConnect Identity Provider
Roland Guijt
-
Contact us
Nerds on a plane: what we can learn from the aviation industry
Sarah Young
-
Contact us
TLS/HTTPS Security for Web Developers
Scott Helme
-
Contact us
Breaking Barriers: The Art of (Free) Gamified Security Training
Joseph Katsioloudes
-
Contact us
Reviewing NuGet Packages security easily using OpenSSF Scorecard
Niels Tanis
-
Contact us
Linux user namespaces: a blessing and a curse
Ignat Korchagin
-
Contact us
OAuth, OpenID Connect and .NET – the Good Parts
Joe DeCock
-
Contact us
From Text to Flaws: vulnerabilities in applications with Generative AI and LLMs
Paul Molin
-
Contact us
Asymmetric Encryption: A Deep Dive
Eli Holderness
-
Contact us
Why Verifiable Credentials and Decentralized Identity?
Daniel Krzyczkowski
-
Contact us
Nerds on a plane: what we can learn from the aviation industry
Sarah Young
-
Contact us
Secure Computing and Hands-on Privacy By Design
Nikolai Norman Andersen
-
Contact us
How AI is impacting cybersecurity. Does it?
Victoria Almazova
-
Contact us
The Final Frontier: Security APIs in Modern Browsers
Christian Wenz
-
Contact us
Drones, RemoteID and the Thrilling Future of UAS Flight
Heather Downing
-
Contact us
Architecting the Future: Building Scalable and Secure Multi-Cloud Applications
Talia Nassi
-
Contact us
SEVEN things about API security
Philippe De Ryck
-
Contact us
ASP.NET Core Authentication and Authorization - the Key Concepts
Anders Abel
-
Contact us
How hacking works - Web edition
Espen Sande-Larsen
-
Contact us
Application security and DevSecOps - end to end
Michael Kaufmann
-
Contact us
Securing APIs by Design
Jose Haro Peralta
-
Contact us
From Role-based to Relationship-based: Transforming Authorization with OpenFGA
Sander Molenkamp
-
Contact us
ASP.NET Core Authentication and Authorization - the Key Concepts
Anders Abel
-
Contact us
Build a lightning fast Firewall with Java & eBPF
Johannes Bechberger
-
Contact us
Modern & secure adaptive streaming on the Web
Katarzyna Dusza
-
Contact us
Data modeling strategies in NoSQL databases
Hasan Savran
-
Contact us
Fine Grained Authorisation with Relationship-Based Access Control
Ben Dechrai
-
Contact us
Total ReDoS: the dangers of regex in JavaScript
Phil Nash
-
Contact us
Harnessing AI for Malevolence: A Hackers Tale
Mackenzie Jackson
-
Contact us
Reverse Engineering with GenAI
Ben Dechrai
-
Contact us
The existential threat against C++ and where to go from here
Helge Penne
-
Contact us
Correct Use of Integers in Safety-critical Systems
Robert Seacord
-
Contact us
(TBD) About Supply Chain Attacks
Patricia Aas
-
Contact us
Keynote: Crypto means Cryptography!
Scott Helme
-
Contact us
Build your own application security program
Laura Bell
-
Contact us
A Builder's Guide to Securing Modern Applications
Philippe De Ryck
-
Contact us
Quantum computing - the next great thing
Hanna Engel
-
Contact us
How to protect yourself from the biggest Internet threats
Ignat Korchagin
-
Contact us
Optimizing Cloud Detection & Response With Security Chaos Engineering
Kennedy Torkura
-
Contact us
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Brock Allen, Joe DeCock
-
Contact us
Web Hacking Workshop
Linus Kvarnhammar
-
Contact us
Fine Grained Authorisation with Relationship-Based Access Control
Ben Dechrai
-
Contact us
Hyper Speed! When Big Data Blooms
Scott Helme
-
Contact us
Building Secure API's and Web Applications
Jim Manico
-
Contact us
Building a High-Value AppSec Scanning Programme
Josh Grossman
-
Contact us
Part 2/2: Securing your .NET application software supply-chain, the practical approach!
Niels Tanis
-
Contact us
Secure Programming for the Enterprise in .NET Framework / .NET Core
Stephen Haunts
-
Contact us
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Dominick Baier, Anders Abel
-
Contact us
Zen and the Art of Code Life Cycle Maintenance
Phil Nash
-
Contact us
OAuth, OpenID Connect & .NET – the Good Parts
Dominick Baier
-
Contact us
Purple is the New Black: Modern Approaches to Application Security
Tanya Janca
-
Contact us
Ten Key Steps for Enhanced Web App Security
Ben Dechrai
-
Contact us
How I Met Your Data
Troy Hunt
-
Contact us
Secure Coding in C and C++
Robert Seacord
-
Contact us
Part 1/2: Securing your .NET application software supply-chain, the practical approach!
Niels Tanis
-
Contact us
API security for developers
Philippe De Ryck
-
Contact us
OAuth in 2021 – What’s up?
Dominick Baier
-
Contact us
Secure Programming for the Enterprise in .NET and .NET Core
Stephen Haunts
-
Contact us
Building Secure ReactJS Applications: Mastering Advanced Security Techniques
Jim Manico
-
Contact us
Architecting Fortresses: A Deep Dive into Advanced Security Measures for ReactJS Applications
Jim Manico
-
Contact us
Identity & Access Control for modern Applications and APIs using ASP.NET Core 8
Joe DeCock
-
Contact us
Advanced Security Design: Threat Modeling Masterclass
Avi Douglen
-
Contact us
Getting API security right
Philippe De Ryck
-
Contact us
(In)Security in C++
Patricia Aas
-
Contact us
Workshop: Securing (and Observing) Kubernetes clusters with Cilium and eBPF - Part 1/2
Hans Kristian Flaatten, Øyvind Randa
-
Contact us
Keynote: Unicorn Hunting
Mikko Hypponen
-
Contact us
Secure Coding and Secure Defaults
Tanya Janca, Claudio Merloni
-
Contact us
How to Talk Security to UX Designers
Laura Bell
-
Contact us
Threat Assessment for Software Architects
Erica Anderson, Laura Bell
-
Contact us
The OWASP Top Ten for Developers
Jim Manico
-
Contact us
Building Scalable and Maintainable APIs with ASP.NET Core Workshop
Spencer Schneidenbach
-
Contact us
Lightning Talks 2
Kristoffer Nordström, Andrew Murphy, Mackenzie Jackson, Ilya Sher, Roland Bodenstaff
-
Contact us
Batten Down the Hatches! A Cluster Security Journey
Jimmy Mesta, Steve Wade
-
Contact us
Architecting Fortresses: A Deep Dive into Advanced Security Measures for ReactJS Applications
Jim Manico
-
Contact us
Part 2/2: Build your own Secure Messenger
Ben Dechrai
-
Contact us
Creating a hybrid and multi-cloud strategy using Azure API Management
Eldert Grootenboer
-
Contact us
Programutvikling uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it