cyber security
![Mastering Web Security: Myths, Strategies & More!](https://files.gotocon.com/uploads/images/conference_42/sessions/3254/thumbnail_1713194416_medium.jpg)
Mastering Web Security: Myths, Strategies & More!
![Application Security: Inside Out](https://files.gotocon.com/uploads/images/conference_62/sessions/2715/thumbnail_1713196544_medium.jpg)
Application Security: Inside Out
![Securing the JVM](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
Securing the JVM
![Does Agile Make Us Less Secure?](https://files.gotocon.com/uploads/images/conference_15/sessions/1142/original/michaelBrSpCPH123.jpg)
Does Agile Make Us Less Secure?
![A Practical Guide to Cybercrime](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
A Practical Guide to Cybercrime
![OAuth Tokens As Your Identity API](https://files.gotocon.com/uploads/images/conference_15/sessions/1003/original/jacobICPH.jpg)
OAuth Tokens As Your Identity API
![The Future of Security](https://files.gotocon.com/uploads/images/conference_15/sessions/975/original/zoeRCph.jpg)
The Future of Security
![Mapping CI/CD Attack Surfaces](https://files.gotocon.com/uploads/images/conference_65/sessions/2928/thumbnail_1716904688_medium.jpg)
Mapping CI/CD Attack Surfaces
![Crafting Robust Architectures for a Resilient Future](https://files.gotocon.com/uploads/images/conference_42/sessions/2957/original/EleanorJez.jpg)
Crafting Robust Architectures for a Resilient Future
![Lessons From Billions of Breached Records [Live Streamed]](https://files.gotocon.com/uploads/images/conference_63/sessions/2560/original/troyAAR23.jpg)
Lessons From Billions of Breached Records [Live Streamed]
![Concurrency Abstractions for Application Security](https://files.gotocon.com/uploads/images/conference_63/sessions/2527/original/bramAAR23.jpg)
Concurrency Abstractions for Application Security
![Protect Your Code with GitHub Security Features](https://files.gotocon.com/uploads/images/conference_63/sessions/2650/original/robAAR23.jpg)
Protect Your Code with GitHub Security Features
![Competence Development Through Capture the Flag and Virtual Hacker Labs](https://files.gotocon.com/uploads/images/conference_63/sessions/2536/original/jensAAR23.jpg)
Competence Development Through Capture the Flag and Virtual Hacker Labs
![Has My IoT Device Been Hacked? Establishing Trust with Remote Attestation](https://files.gotocon.com/uploads/images/conference_63/sessions/2591/original/edliraAAR23.jpg)
Has My IoT Device Been Hacked? Establishing Trust with Remote Attestation
![Shaping Language in Cybersecurity For People](https://files.gotocon.com/uploads/images/conference_63/sessions/2664/original/ceriAAR.jpg)
Shaping Language in Cybersecurity For People
![Principles For Secure and Reliable Systems](https://files.gotocon.com/uploads/images/conference_63/sessions/2698/original/eleanorAAR23.jpg)
Principles For Secure and Reliable Systems
![Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack](https://files.gotocon.com/uploads/images/conference_65/sessions/2907/original/scottCPH23.jpg)
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
![Sandworm Q&A](https://files.gotocon.com/uploads/images/conference_65/sessions/2937/thumbnail_1718194743_medium.jpg)
Sandworm Q&A
![It’s a Kind of Magic: Computation on Ciphertexts](https://files.gotocon.com/uploads/images/conference_65/sessions/2940/thumbnail_1718290867_medium.jpg)
It’s a Kind of Magic: Computation on Ciphertexts
![#ToyFail: Is your Child Safe from the Internet of Things?](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
#ToyFail: Is your Child Safe from the Internet of Things?
![#ToyFail](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
#ToyFail
![Security and Trust in a Microservices World](https://files.gotocon.com/uploads/images/conference_9/sessions/453/original/aaronCHI.jpg)
Security and Trust in a Microservices World
![From the OWASP Top Ten(s) to the OWASP ASVS](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
From the OWASP Top Ten(s) to the OWASP ASVS
![Cloud Native is about Culture, not Containers](https://files.gotocon.com/uploads/images/conference_10/sessions/612/original/holly.jpg)
Cloud Native is about Culture, not Containers
![Ethereum Fundamentals](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
Ethereum Fundamentals
![From the OWASP Top Ten(s) to the OWASP ASVS](https://files.gotocon.com/uploads/images/conference_12/sessions/518/original/philippe.jpg)
From the OWASP Top Ten(s) to the OWASP ASVS
![Building a Smart Security Camera with Raspberry Pi Zero, Java and AWS](https://files.gotocon.com/uploads/images/conference_10/sessions/540/original/mark.jpg)
Building a Smart Security Camera with Raspberry Pi Zero, Java and AWS
![Insecure Transit - Microservice](https://files.gotocon.com/uploads/images/conference_12/sessions/523/original/sam.jpg)
Insecure Transit - Microservice
![Royal Testing: Purple Teaming to Build & Secure Applications Better!](https://files.gotocon.com/uploads/images/conference_3/sessions/56/original/kevinJCHI.png)
Royal Testing: Purple Teaming to Build & Secure Applications Better!
![Automating Security & Compliance (for Fun & Profit)](https://files.gotocon.com/uploads/images/conference_3/sessions/89/original/nicoleCHI.png)
Automating Security & Compliance (for Fun & Profit)
![Internet of Targets](https://files.gotocon.com/uploads/images/conference_5/sessions/223/original/leifCPHasdfads.png)
Internet of Targets
![Keynote: The Current State of Automotive Security](https://files.gotocon.com/uploads/images/conference_4/sessions/136/original/chrisVAMS.png)
Keynote: The Current State of Automotive Security
![Security in the Delivery Pipeline](https://files.gotocon.com/uploads/images/conference_4/sessions/201/original/jamesAMS.jpg)
Security in the Delivery Pipeline
![Secure Substrate: Building the Moby Whale](https://files.gotocon.com/uploads/images/conference_5/sessions/163/original/diogoCPH123123.png)
Secure Substrate: Building the Moby Whale
![Internet of Targets](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
Internet of Targets
![Putting Your Security on the Wire](https://files.gotocon.com/uploads/images/conference_10/sessions/605/original/damien.jpg)
Putting Your Security on the Wire
![Containers From Scratch](https://files.gotocon.com/uploads/images/conference_11/sessions/429/original/lizAMS.jpg)
Containers From Scratch
![Securing APIs and Microservices with OAuth and OpenID Connect](https://files.gotocon.com/uploads/images/conference_10/sessions/607/original/travisCPH.jpg)
Securing APIs and Microservices with OAuth and OpenID Connect
![Confusion in the Land of the Serverless](https://files.gotocon.com/uploads/images/conference_11/sessions/386/original/samAMS.jpg)
Confusion in the Land of the Serverless
![Let's all just agree: Achieving consensus in Blockchain-based systems](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
Let's all just agree: Achieving consensus in Blockchain-based systems
![Common API Security Pitfalls](https://files.gotocon.com/uploads/images/conference_14/sessions/810/original/philippedRAMS1.jpg)
Common API Security Pitfalls
![Introduction to OAuth 2.0 and OpenID Connect](https://files.gotocon.com/uploads/images/conference_12/sessions/653/original/philippe2.jpg)
Introduction to OAuth 2.0 and OpenID Connect
![Principles for Developing More Secure Systems](https://files.gotocon.com/uploads/images/conference_13/sessions/731/original/eleanorSCHI.jpg)
Principles for Developing More Secure Systems
![Content Security Policies: Let's Break Stuff](https://files.gotocon.com/uploads/images/conference_10/sessions/575/original/matt.jpg)
Content Security Policies: Let's Break Stuff
![SSL/TLS for Mortals](https://files.gotocon.com/uploads/images/conference_12/sessions/684/original/maarten.jpg)
SSL/TLS for Mortals
![DevSecOps, Containers, and Shift-Left, are those just Buzzwords? And why should we Care?](https://files.gotocon.com/uploads/images/conference_13/sessions/840/original/juanJamesCHI.jpg)
DevSecOps, Containers, and Shift-Left, are those just Buzzwords? And why should we Care?
![AppSec: From the OWASP Top Ten(s) to the OWASP ASVS](https://files.gotocon.com/uploads/images/conference_13/sessions/709/original/jimMaCHI.jpg)
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
![Securing the JVM](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
Securing the JVM
![Content Security Policies: Let's Break Stuff](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
Content Security Policies: Let's Break Stuff
![Securing the JVM](https://files.gotocon.com/uploads/images/conference_13/sessions/801/original/nicolasFCHI.jpg)
Securing the JVM
![OAuth and OpenID Connect in Plain English](https://files.gotocon.com/uploads/images/conference_21/sessions/1276/original/nateBCHI.jpg)
OAuth and OpenID Connect in Plain English
![Building Secure React Applications [VIRTUAL]](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
Building Secure React Applications [VIRTUAL]
![Practical End-to-End Container Security at Scale](https://files.gotocon.com/uploads/images/conference_21/sessions/1273/original/yashvierCHI.jpg)
Practical End-to-End Container Security at Scale
![Building Secure React Applications](https://files.gotocon.com/uploads/images/conference_16/sessions/833/original/philippeDRBER.jpg)
Building Secure React Applications
![Spring Cloud Gateway: Resilience and Security](https://files.gotocon.com/uploads/images/conference_35/sessions/1956/original/thomasVCPH1.jpg)
Spring Cloud Gateway: Resilience and Security
![Machine Learning Security Operations at One of the World's Largest Brewing Companies](https://files.gotocon.com/uploads/images/conference_38/sessions/1983/original/mauritsAMS.jpg)
Machine Learning Security Operations at One of the World's Largest Brewing Companies
![Adapting DevOps in a World of Growing Software Supply Chain Attacks](https://files.gotocon.com/uploads/images/conference_35/sessions/1959/original/adamSUCHCPH.jpg)
Adapting DevOps in a World of Growing Software Supply Chain Attacks
![Practical Tips and Tricks for CI/CD Success](https://files.gotocon.com/uploads/images/conference_38/sessions/2012/original/zanAMS.jpg)
Practical Tips and Tricks for CI/CD Success
![Static Code Analysis - A Behind-the-scenes Look](https://files.gotocon.com/uploads/images/conference_38/sessions/2016/original/arnoAMS.jpg)
Static Code Analysis - A Behind-the-scenes Look
![Beyond Passwords: How WebAuthn Actually Works](https://files.gotocon.com/uploads/images/conference_62/sessions/2450/original/eliAMS23.jpg)
Beyond Passwords: How WebAuthn Actually Works
![Building Images For The Secure Supply Chain](https://files.gotocon.com/uploads/images/conference_62/sessions/2472/original/adrianAMS23.jpg)
Building Images For The Secure Supply Chain
![The One Where We Threat Model During Development](https://files.gotocon.com/uploads/images/conference_62/sessions/2451/original/izarAMS23.jpg)
The One Where We Threat Model During Development
![Security By Design](https://files.gotocon.com/uploads/images/conference_62/sessions/2491/original/anaAMS23.jpg)
Security By Design
![Catching Commits to Secure Infrastructure as Code](https://files.gotocon.com/uploads/images/conference_66/sessions/2585/original/rosemaryCHI23.jpg)
Catching Commits to Secure Infrastructure as Code
![Privacy, Crime, National Security, Human Rights & You in the Middle](https://files.gotocon.com/uploads/images/conference_62/sessions/2476/original/bertAMS23.jpg)
Privacy, Crime, National Security, Human Rights & You in the Middle
![One Does Not Simply Add MFA](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
One Does Not Simply Add MFA
![One Does Not Simply Add MFA](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
One Does Not Simply Add MFA
![One Does Not Simply Add MFA](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
One Does Not Simply Add MFA
![GitHub Advanced Security: Helping Developers Secure the World’s Software](https://files.gotocon.com/uploads/images/conference_65/sessions/2757/thumbnail_1716799641_medium.jpg)
GitHub Advanced Security: Helping Developers Secure the World’s Software
![Cryptocurrencies Are Traceable & What Is Crypto-jacking?](https://files.gotocon.com/uploads/images/conference_42/sessions/3136/original/AndyScott.jpg)
Cryptocurrencies Are Traceable & What Is Crypto-jacking?
![The State of Application Security 2023: Learnings from 4 Million Scanned Services](https://files.gotocon.com/uploads/images/conference_65/sessions/2961/original/sebastianCPH23.jpg)
The State of Application Security 2023: Learnings from 4 Million Scanned Services
![Using IAST to Unlock the Benefits of DevSecOps](https://files.gotocon.com/uploads/images/conference_57/sessions/2430/original/YOW22jeff.jpg)
Using IAST to Unlock the Benefits of DevSecOps
![Building Layers of Defense with Spring Security](https://files.gotocon.com/uploads/images/conference_4/sessions/145/original/jorisAMS.jpg)
Building Layers of Defense with Spring Security
![HORRORLARITY](https://files.gotocon.com/uploads/images/conference_16/sessions/929/original/leifNBER.jpg)
HORRORLARITY
![Think like a Hacker](https://files.gotocon.com/uploads/images/conference_16/sessions/932/original/mattBruBER.jpg)
Think like a Hacker
![Building a Self-driving RC Car](https://files.gotocon.com/uploads/images/conference_16/sessions/927/original/bertjanBER.jpg)
Building a Self-driving RC Car
![The Evolution of Threat Models for Secure Communication Products](https://files.gotocon.com/uploads/images/conference_11/sessions/402/original/philAMS1.jpg)
The Evolution of Threat Models for Secure Communication Products
![An Insider's Guide to Cloud Computing](https://files.gotocon.com/uploads/images/conference_34/sessions/3310/thumbnail_1717589068_medium.jpg)
An Insider's Guide to Cloud Computing
![Practical Data Privacy](https://files.gotocon.com/uploads/images/conference_62/sessions/2502/original/katharineAMS23.jpg)
Practical Data Privacy
![Putting Your Security on the Wire](https://files.gotocon.com/uploads/images/conference_10/sessions/605/original/damien.jpg)
Putting Your Security on the Wire
![#ToyFail](https://files.gotocon.com/uploads/images/conference_11/sessions/431/original/martinKristianAMS.jpg)
#ToyFail
![#ToyFail](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
#ToyFail
![From the OWASP Top Ten(s) to the OWASP ASVS](https://files.gotocon.com/uploads/images/conference_12/sessions/518/original/philippe.jpg)
From the OWASP Top Ten(s) to the OWASP ASVS
![#ToyFail: Is your Child Safe from the Internet of Things?](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
#ToyFail: Is your Child Safe from the Internet of Things?
![Privacy in Software](https://files.gotocon.com/uploads/images/conference_5/sessions/238/original/emmaCPH12321.png)
Privacy in Software
![From the OWASP Top Ten(s) to the OWASP ASVS](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
From the OWASP Top Ten(s) to the OWASP ASVS
![Creating Local-First Collaboration Software with Automerge](https://files.gotocon.com/uploads/images/conference_62/sessions/2449/original/martinAMS23.jpg)
Creating Local-First Collaboration Software with Automerge
![Keynote: Surveillance & Cryptography](https://files.gotocon.com/uploads/images/conference_4/sessions/134/original/jayaAMS.jpg)
Keynote: Surveillance & Cryptography
![Beyond Passwords: How WebAuthn Actually Works](https://files.gotocon.com/uploads/images/conference_62/sessions/2450/original/eliAMS23.jpg)
Beyond Passwords: How WebAuthn Actually Works
![AppSec: From the OWASP Top Ten(s) to the OWASP ASVS](https://files.gotocon.com/uploads/images/conference_13/sessions/709/original/jimMaCHI.jpg)
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
![The State of Application Security 2023: Learnings from 4 Million Scanned Services](https://files.gotocon.com/uploads/images/conference_65/sessions/2961/original/sebastianCPH23.jpg)
The State of Application Security 2023: Learnings from 4 Million Scanned Services
![From the OWASP Top Ten(s) to the OWASP ASVS](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
From the OWASP Top Ten(s) to the OWASP ASVS
![From the OWASP Top Ten(s) to the OWASP ASVS](https://files.gotocon.com/uploads/images/conference_12/sessions/518/original/philippe.jpg)
From the OWASP Top Ten(s) to the OWASP ASVS
![Hacking the Internet of Things for Fun & Profit](https://files.gotocon.com/uploads/images/conference_4/sessions/127/original/rubenAMS.png)
Hacking the Internet of Things for Fun & Profit
![AppSec: From the OWASP Top Ten(s) to the OWASP ASVS](https://files.gotocon.com/uploads/images/conference_13/sessions/709/original/jimMaCHI.jpg)
AppSec: From the OWASP Top Ten(s) to the OWASP ASVS
![Code as Risk](https://files.gotocon.com/uploads/images/conference_4/sessions/144/original/kevlinAMS.jpg)
Code as Risk
![Hacking the Internet of Things for Fun & Profit](https://files.gotocon.com/uploads/images/conference_4/sessions/127/original/rubenAMS.png)
Hacking the Internet of Things for Fun & Profit
![How The Hack?](https://files.gotocon.com/uploads/images/conference_62/sessions/2487/original/benSaAMS23.jpg)
How The Hack?
![A Practical Guide to Cybercrime](/images/front-about-fb096b0e50cf7b9bcfc02590b743575f.jpg?vsn=d)
A Practical Guide to Cybercrime
![The Future of Security](https://files.gotocon.com/uploads/images/conference_15/sessions/975/original/zoeRCph.jpg)
The Future of Security
![Sandworm Q&A](https://files.gotocon.com/uploads/images/conference_65/sessions/2937/thumbnail_1718194743_medium.jpg)
Sandworm Q&A
![Hacking the Internet of Things for Fun & Profit](https://files.gotocon.com/uploads/images/conference_4/sessions/127/original/rubenAMS.png)
Hacking the Internet of Things for Fun & Profit
![Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack](https://files.gotocon.com/uploads/images/conference_65/sessions/2907/original/scottCPH23.jpg)
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
![Keynote: The Current State of Automotive Security](https://files.gotocon.com/uploads/images/conference_4/sessions/136/original/chrisVAMS.png)
Keynote: The Current State of Automotive Security
![The Evolution of Threat Models for Secure Communication Products](https://files.gotocon.com/uploads/images/conference_11/sessions/402/original/philAMS1.jpg)
The Evolution of Threat Models for Secure Communication Products
![The One Where We Threat Model During Development](https://files.gotocon.com/uploads/images/conference_62/sessions/2451/original/izarAMS23.jpg)
The One Where We Threat Model During Development
![Competence Development Through Capture the Flag and Virtual Hacker Labs](https://files.gotocon.com/uploads/images/conference_63/sessions/2536/original/jensAAR23.jpg)
Competence Development Through Capture the Flag and Virtual Hacker Labs
![The Best of GOTO Book Club Part Two](https://files.gotocon.com/uploads/article_images/1/142/highlights2_medium.jpg)
The Best of GOTO Book Club Part Two
![AWS Cookbook: Recipes for Success on AWS](https://files.gotocon.com/uploads/article_images/1/187/teaser_keshajohnmike_medium.jpg)
AWS Cookbook: Recipes for Success on AWS
![Practical Data Privacy: Enhancing Privacy and Security in Data](https://files.gotocon.com/uploads/article_images/1/277/katharinealyona_medium.jpg)
Practical Data Privacy: Enhancing Privacy and Security in Data
![Container Security: Fundamental Technology Concepts that Protect Containerized Applications](https://files.gotocon.com/uploads/article_images/1/47/lizeoin_medium.jpg)
![Advanced OAuth and Pitfalls](https://files.gotocon.com/uploads/article_images/1/35/aaronericbonus_medium.jpg)
Advanced OAuth and Pitfalls
![Understanding the Secrets of OAuth 2.0 with Aaron Parecki](https://files.gotocon.com/uploads/article_images/1/25/aaroneric_medium.jpg)
Understanding the Secrets of OAuth 2.0 with Aaron Parecki
![Security Chaos Engineering](https://files.gotocon.com/uploads/article_images/1/173/teaser_kellyaaronmark_medium.jpg)
Security Chaos Engineering
![Insider's Guide to Cloud Computing](https://files.gotocon.com/uploads/article_images/1/313/davidprasad_medium.jpg)
Insider's Guide to Cloud Computing
![Practical Data Privacy: Enhancing Privacy and Security in Data](https://files.gotocon.com/uploads/article_images/1/277/katharinealyona_medium.jpg)
Practical Data Privacy: Enhancing Privacy and Security in Data
![How to Adopt a Seamless Shift-Left Security Process](https://files.gotocon.com/uploads/article_images/1/85/all_%20blog%20post%20images-29_medium.png)
How to Adopt a Seamless Shift-Left Security Process
From Sci-Fi to Reality, Quantum Computers Are Coming!
![How to Keep Your Cloud-Native Apps Secure](https://files.gotocon.com/uploads/article_images/1/113/all%20blog%20post%20images-2_medium.png)
How to Keep Your Cloud-Native Apps Secure
![Developing in Blockchain: The Need-To-Know When Getting Started](https://files.gotocon.com/uploads/article_images/1/123/49033326691_b76ae63daa_c-2_medium.jpg)
Developing in Blockchain: The Need-To-Know When Getting Started
![Mastering Web Security: Myths, Strategies & More!](https://files.gotocon.com/uploads/article_images/1/304/scottsebastian_medium.jpg)
Mastering Web Security: Myths, Strategies & More!
![Crafting Robust Architectures for a Resilient Future](https://files.gotocon.com/uploads/article_images/1/255/eleanorjez_medium.jpg)
Crafting Robust Architectures for a Resilient Future
![The Current State of Cyber Security](https://files.gotocon.com/uploads/article_images/1/212/eleanoraino_medium.jpg)
The Current State of Cyber Security
![Technology’s Impact on Humankind and Where We’re Headed Next](https://files.gotocon.com/uploads/article_images/1/65/marcounscripted_medium.jpg)
Technology’s Impact on Humankind and Where We’re Headed Next
![Bridging Cybersecurity: Detectify](https://files.gotocon.com/uploads/article_images/1/171/rickardj%C3%B8rn_medium.jpg)
Bridging Cybersecurity: Detectify
![A Container Security Checklist](https://files.gotocon.com/uploads/article_images/1/120/48132280348_0d4bb3be90_c_medium.jpg)
A Container Security Checklist
![Java Security and the Java Ecosystem](https://files.gotocon.com/uploads/article_images/1/131/nicolas2_medium.jpg)
Java Security and the Java Ecosystem
![Should We Be on the Lookout for OAuth 3.0?](https://files.gotocon.com/uploads/article_images/1/34/screenshot%202020-10-28%20at%2020.20.16_medium.png)
Should We Be on the Lookout for OAuth 3.0?
![Expert Talk: Software Security](https://files.gotocon.com/uploads/article_images/1/164/jimjohn_medium.jpg)
Expert Talk: Software Security
![Expert Talk: Software Security](https://files.gotocon.com/uploads/article_images/1/164/jimjohn_medium.jpg)
Expert Talk: Software Security
![The Current State of Cyber Security](https://files.gotocon.com/uploads/article_images/1/212/eleanoraino_medium.jpg)
The Current State of Cyber Security
![Mastering Web Security: Myths, Strategies & More!](https://files.gotocon.com/uploads/article_images/1/304/scottsebastian_medium.jpg)
Mastering Web Security: Myths, Strategies & More!
![Unlocking the Web: Exploring WebAuthn and Beyond](https://files.gotocon.com/uploads/article_images/1/281/elimark_medium.jpg)
Unlocking the Web: Exploring WebAuthn and Beyond
![Katharine Jarmul](https://files.gotocon.com/uploads/portraits/445/square_medium/katharine_jarmul_1548156764.jpg)
Katharine Jarmul
Thoughtworks
Principal Data Scientist at Thoughtworks & O'Reilly Author
![Andy Greenberg](https://files.gotocon.com/uploads/portraits/1380/square_medium/andy_greenberg_1674564140.jpg)
Andy Greenberg
New York Times
Author of "Sandworm" and "Tracers in the Dark". Writes about security, privacy, information freedom, and hacker culture.