Home Conference Sessions Cyber security

Conference Sessions: Expert Talks, Tech Insights and Innovation

All programming software architecture (tech) teams cyber security serverless machine learning (ML) Microservices artificial intelligence (AI) DevOps programming languages
31:13
It’s a Kind of Magic: Computation on Ciphertexts
It’s a Kind of Magic: Computation on Ciphertexts
GOTO Copenhagen 2023
47:47
Sandworm Q&A
Sandworm Q&A
GOTO Copenhagen 2023
39:44
Mapping CI/CD Attack Surfaces
Mapping CI/CD Attack Surfaces
GOTO Copenhagen 2023
55:12
GitHub Advanced Security: Helping Developers Secure the World’s Software
GitHub Advanced Security: Helping Developers Secure the World’s Software
GOTO Copenhagen 2023
28:28
Application Security: Inside Out
Application Security: Inside Out
GOTO Amsterdam 2023
31:44
Mastering Web Security: Myths, Strategies & More!
Mastering Web Security: Myths, Strategies & More!
GOTO Unscripted
44:54
The State of Application Security 2023: Learnings from 4 Million Scanned Services
The State of Application Security 2023: Learnings from 4 Million Scanned Services
GOTO Copenhagen 2023
48:38
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
GOTO Copenhagen 2023
42:36
Security By Design
Security By Design
GOTO Amsterdam 2023
43:49
Cryptocurrencies Are Traceable & What Is Crypto-jacking?
Cryptocurrencies Are Traceable & What Is Crypto-jacking?
GOTO Unscripted
45:22
Catching Commits to Secure Infrastructure as Code
Catching Commits to Secure Infrastructure as Code
GOTO Chicago 2023
Unlocking the Web: Exploring WebAuthn & Beyond
Unlocking the Web: Exploring WebAuthn & Beyond
GOTO Unscripted
59:52
The One Where We Threat Model During Development
The One Where We Threat Model During Development
GOTO Amsterdam 2023
33:29
Building Images For The Secure Supply Chain
Building Images For The Secure Supply Chain
GOTO Amsterdam 2023
33:5
Using IAST to Unlock the Benefits of DevSecOps
Using IAST to Unlock the Benefits of DevSecOps
YOW! London 2022
29:39
Crafting Robust Architectures for a Resilient Future
Crafting Robust Architectures for a Resilient Future
GOTO Unscripted
41:44
Beyond Passwords: How WebAuthn Actually Works
Beyond Passwords: How WebAuthn Actually Works
GOTO Amsterdam 2023
42:1
Privacy, Crime, National Security, Human Rights & You in the Middle
Privacy, Crime, National Security, Human Rights & You in the Middle
GOTO Amsterdam 2023
40:11
Has My IoT Device Been Hacked? Establishing Trust with Remote Attestation
Has My IoT Device Been Hacked? Establishing Trust with Remote Attestation
GOTO Aarhus 2023
48:59
Protect Your Code with GitHub Security Features
Protect Your Code with GitHub Security Features
GOTO Aarhus 2023
38:44
Competence Development Through Capture the Flag and Virtual Hacker Labs
Competence Development Through Capture the Flag and Virtual Hacker Labs
GOTO Aarhus 2023
38:10
Shaping Language in Cybersecurity For People
Shaping Language in Cybersecurity For People
GOTO Aarhus 2023
50:14
Lessons From Billions of Breached Records [Live Streamed]
Lessons From Billions of Breached Records [Live Streamed]
GOTO Aarhus 2023
39:43
Principles For Secure and Reliable Systems
Principles For Secure and Reliable Systems
GOTO Aarhus 2023
42:39
Concurrency Abstractions for Application Security
Concurrency Abstractions for Application Security
GOTO Aarhus 2023
25:56
Machine Learning Security Operations at One of the World's Largest Brewing Companies
Machine Learning Security Operations at One of the World's Largest Brewing Companies
GOTO Amsterdam 2022
37:37
Static Code Analysis - A Behind-the-scenes Look
Static Code Analysis - A Behind-the-scenes Look
GOTO Amsterdam 2022
32:26
Practical Tips and Tricks for CI/CD Success
Practical Tips and Tricks for CI/CD Success
GOTO Amsterdam 2022
31:35
Adapting DevOps in a World of Growing Software Supply Chain Attacks
Adapting DevOps in a World of Growing Software Supply Chain Attacks
GOTO Copenhagen 2021
43:21
Spring Cloud Gateway: Resilience and Security
Spring Cloud Gateway: Resilience and Security
GOTO Copenhagen 2021
17:58
Practical End-to-End Container Security at Scale
Practical End-to-End Container Security at Scale
GOTO Chicago 2020
18:45
OAuth and OpenID Connect in Plain English
OAuth and OpenID Connect in Plain English
GOTO Chicago 2020
46:37
Does Agile Make Us Less Secure?
Does Agile Make Us Less Secure?
GOTO Copenhagen 2019
47:44
OAuth Tokens As Your Identity API
OAuth Tokens As Your Identity API
GOTO Copenhagen 2019
41:58
The Future of Security
The Future of Security
GOTO Copenhagen 2019
28:20
HORRORLARITY
HORRORLARITY
GOTO Berlin 2019
42:22
Think like a Hacker
Think like a Hacker
GOTO Berlin 2019
44:39
Building Secure React Applications
Building Secure React Applications
GOTO Berlin 2019
44:9
Building a Self-driving RC Car
Building a Self-driving RC Car
GOTO Berlin 2019
39:36
Common API Security Pitfalls
Common API Security Pitfalls
GOTO Amsterdam 2019
44:19
Securing the JVM
Securing the JVM
GOTO Chicago 2019
51:30
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Chicago 2019
51:58
Principles for Developing More Secure Systems
Principles for Developing More Secure Systems
GOTO Chicago 2019
33:00
DevSecOps, Containers, and Shift-Left, are those just Buzzwords? And why should we Care?
DevSecOps, Containers, and Shift-Left, are those just Buzzwords? And why should we Care?
GOTO Chicago 2019
42:20
Securing APIs and Microservices with OAuth and OpenID Connect
Securing APIs and Microservices with OAuth and OpenID Connect
GOTO Copenhagen 2018
41:21
Putting Your Security on the Wire
Putting Your Security on the Wire
GOTO Copenhagen 2018
38:38
Content Security Policies: Let's Break Stuff
Content Security Policies: Let's Break Stuff
GOTO Copenhagen 2018
44:7
Building a Smart Security Camera with Raspberry Pi Zero, Java and AWS
Building a Smart Security Camera with Raspberry Pi Zero, Java and AWS
GOTO Copenhagen 2018
51:9
Cloud Native is about Culture, not Containers
Cloud Native is about Culture, not Containers
GOTO Copenhagen 2018
47:18
Introduction to OAuth 2.0 and OpenID Connect
Introduction to OAuth 2.0 and OpenID Connect
GOTO Berlin 2018
43:37
SSL/TLS for Mortals
SSL/TLS for Mortals
GOTO Berlin 2018
50:57
Insecure Transit - Microservice
Insecure Transit - Microservice
GOTO Berlin 2018
40:33
From the OWASP Top Ten(s) to the OWASP ASVS
From the OWASP Top Ten(s) to the OWASP ASVS
GOTO Berlin 2018
49:15
Security and Trust in a Microservices World
Security and Trust in a Microservices World
GOTO Chicago 2018
54:36
Confusion in the Land of the Serverless
Confusion in the Land of the Serverless
GOTO Amsterdam 2018
57:32
The Evolution of Threat Models for Secure Communication Products
The Evolution of Threat Models for Secure Communication Products
GOTO Amsterdam 2018
42:54
Containers From Scratch
Containers From Scratch
GOTO Amsterdam 2018
42:45
Secure Substrate: Building the Moby Whale
Secure Substrate: Building the Moby Whale
GOTO Copenhagen 2017