Agenda
Filter by category
Hacking
Supply Chain
Cloud Security
Application Security
Architecture
Culture
Design
Fun
People
Security Tooling
IoT
Platforms
Experience report
Programming
AI/ML
Bug Bounties
Dark Arts
Cloud
DevOps
Tooling
SDLC
Process
Keynote
Privacy
Tools
Testing
Kubernetes
Filter by length
All
Talk
Workshop
Wednesday
4 March
Thursday
5 March
10:20 - 11:20 (UTC+01)
Room 1
25 Years of the Microsoft SDL

Michael Howard
Room 2
Getting Authorization Right in .NET: Patterns, Pitfalls, and Practical Guidance

Michele Leroux Bustamante
Room 3
MITRE ATT&CK for Developers

Chris Ayers
Room 5
Part 1/2: Hack your own pipeline (before someone else does)

Jan-Kåre Solbakken

Emil Albrektsson
11:40 - 12:40 (UTC+01)
Room 1
An AppSec Tale: From Zero to 250+ Champions

Even Tillerli

Nicole Silva
Room 2
ASP.NET Core meets OWASP Top 10 2025

Anders Abel
Room 3
Placeholder - Scott Helme

Scott Helme
Room 4
The Risky Business, of AI Illiteracy

Sean Juroviesky
Room 5
Part 2/2: Hack your own pipeline (before someone else does)

Jan-Kåre Solbakken

Emil Albrektsson
13:40 - 14:40 (UTC+01)
Room 1
Web Tracking Technologies

Yana Dimova
Room 2
Beyond Trust: Building Community-Driven Security Analysis for Your .NET Software Supply Chain

Niels Tanis
Room 3
How to Know Your Client Is Real: Hardware-Backed Authentication Patterns

Victor Lyuboslavsky
Room 4
AI Agents and Jupyter Notebooks for Security Data Analysis

Roberto Rodriguez
Room 5
Part 1/2: Games as tools for scaling your application security program

Johan Sydseter
15:00 - 16:00 (UTC+01)
Room 1
Demystifying CSP for modern applications

Philippe De Ryck
Room 2
Won't somebody please think of the children!?

Niall Merrigan
Room 3
Have I Been Pwned - A Passkey Journey

Stefán Jökull Sigurðarson
Room 4
Securing Code in the Age of AI

Simona Toader
Room 5
Part 2/2: Games as tools for scaling your application security program

Johan Sydseter
16:20 - 17:20 (UTC+01)
Room 1
Safe by design: the UX of secure banking

Dora Makszy
Room 2
Seeing Isn’t Believing: Deepfakes Without the Panic

Tudor Damian
Room 3
sshlogin: securely authenticating to remote Linux systems via a serial or a text-based interface

Ignat Korchagin
Room 4
Prompt Hardening - Secure Code Generation Using AI

Sean Sinclair
Room 5
Lightning Talks 1

Mackenzie Jackson

Cody Burkard

Håvard Eide




