{ } Programutvikling
Events and Workshops
In-house
About us
Dark
Light
Filter
Course Calendar
Sort after topic
Jan 20
NDC Security 2025
20 - 23 January 2025
40
Speakers
20
Technologies
8
Workshops
50
Talks
Jan 20
AI Red Teaming in Practice
Amanda Minnich (AIRT), Gary Lopez
2 days
Radisson Blu Scandinavia Hotel
15 990 NOK
Register
Jan 22
RAG Against the Machine
Brennan Lodge
1 hour
-
Jan 22
Part 1: Stop Firefighting Vulnerabilities, Start Eliminating Bug Classes at Scale: A Hands-On Workshop
Javan Rasokat
1 hour
-
Jan 22
Part 2: Stop Firefighting Vulnerabilities, Start Eliminating Bug Classes at Scale: A Hands-On Workshop
Javan Rasokat
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 23
Inside Google's Discovery and Remediation of a Critical CPU Vulnerability
Yousif Hussin
1 hour
-
Jan 23
Part 1: Securing Kubernetes: Practical Workflows and Tools for Enhanced Cluster Protection
Rabieh Fashwall
1 hour
-
Jan 23
Part 2: Securing Kubernetes: Practical Workflows and Tools for Enhanced Cluster Protection
Rabieh Fashwall
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 23
Advanced Malware Analysis Techniques – Unmasking Hidden Threats
Ankshika Maunthrooa
1 hour
-
Jan 23
TPMs and the Linux Kernel: unlocking a better path to hardware security
Ignat Korchagin
1 hour
-
Jan 23
Role-Based Access is So Yesterday: Revolutionizing Authorization with Open FGA
Kiah Imani
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 23
Spoofing Commands - Can You Trust Process Creation Logs?
Tristan Bennett
1 hour
-
Jan 23
War Stories From the SOC
David Lilja
1 hour
-
Jan 27
NDC London 2025
27 - 31 January 2025
100
Speakers
50
Technologies
12
Workshops
110
Talks
Apr 29
NDC Melbourne 2025
29 April - 1 May 2025
40
Speakers
30
Technologies
10
Workshops
50
Talks
May 19
NDC Oslo 2025
19 - 23 May 2025
150
Speakers
45
Technologies
20
Workshops
160
Talks
Sept 8
Copenhagen Developers Festival 2025
8 - 12 September 2025
100
Speakers
5
Bands
100
Talks
10
Workshops
Sept 22
NDC TechTown 2025
22 - 25 September 2025
50
Speakers
15
Technologies
10
Workshops
60
Talks
On demand courses
Asymmetric Encryption: A Deep Dive
Eli Holderness
-
Contact us
What I learnt about automating security
George Coldham
-
Contact us
Defendable Products: How we try to improve security in our products
Ståle Pettersen
-
Contact us
OPA everywhere! Exploring new opportunities in policy evaluation
Anders Eknert
-
Contact us
A data driven approach to application security
Petter Kvalvaag, Kristian Reed
-
Contact us
How hacking works - Web Edition
Espen Sande-Larsen
-
Contact us
What happens if I change this URI… oooooh
Halvor Sakshaug
-
Contact us
Security as Code: A DevSecOps Approach
Joseph Katsioloudes
-
Contact us
Securely deploying Infrastructure as Code
Chris Ayers
-
Contact us
Developing secure software with GitHub
Laura Kokkarinen, Thomas Vochten
-
Contact us
Surprising ways to escalate privileges in Entra ID
Marius Solbakken Mellum
-
Contact us
Assessing NuGet Packages more easily with Security Scorecards
Niels Tanis
-
Contact us
AWS Security Reference Architecture: Visualize your security
Mohamed Wali
-
Contact us
Detecting Malicious Activity: Unveiling the Secrets of MS-SQL Logging
Tristan Bennett
-
Contact us
Sandboxing in Linux with zero lines of code
Ignat Korchagin
-
Contact us
Microsoft Security Copilot - your new best friend!
George Coldham
-
Contact us
Passwords are Dead, Long live Passkeys!
Stephen Rees-Carter
-
Contact us
Tune your Toolbox for Velocity and Value
Josh Grossman
-
Contact us
No Size Fits All: Empowering Engineers with Custom Application Security tests
Michal Kamensky
-
Contact us
Detect threats and misconfigurations in your GCP environment and operationalize on findings
Brian Jung
-
Contact us
Leveraging graph AI and GPUs to win the US Cyber Command AI challenge
Leo Meyerovich
-
Contact us
Part 1/2: Hands-on grand tour of GPU Graph AI for security event correlation
Leo Meyerovich, Alex Morrise
-
Contact us
Part 2/2: Hands-on grand tour of GPU Graph AI for security event correlation
Leo Meyerovich, Alex Morrise
-
Contact us
Container Security with Falco: A Quick Start Guide
Ayesha Kaleem
-
Contact us
Building a High-Value AppSec Scanning Programme
Josh Grossman
-
Contact us
Programutvikling uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it