Agenda
Filter by category
Hacking
Supply Chain
Cloud Security
Application Security
Architecture
Culture
Design
Fun
People
Security Tooling
IoT
Platforms
Experience report
Programming
AI/ML
Bug Bounties
Dark Arts
Cloud
DevOps
Tooling
.NET
Security
Process
Keynote
SDLC
Privacy
Tools
AI
Testing
Kubernetes
NDC Party
Filter by length
All
Talk
Workshop
Wednesday
4 March
Thursday
5 March
09:00 - 10:00 (UTC+01)
Room 1
Three decades of curl

Daniel Stenberg
Room 2
The server that talked back: a deep dive into SSRFs

Sofia Lindqvist
Room 3
app.alert(1) is the new alert(1): PDFs as a vector to inject JavaScript code in web applications

Luigi Gubello
Room 4- OWASP
Automated Security Testing with OWASP Nettacker

Sam Stepanyan
Room 5
Part 1/2: Securing your AI code generation workflow

Armin Buescher

Erlend Oftedal
10:20 - 11:20 (UTC+01)
Room 1
Post-quantum cryptography for .NET developers

Filip W.
Room 2
Is Your Approach to Pipeline Security Flawed? Rethinking CI/CD Security

Patricia R
Room 3
Protocol-Hopping C2: Transport-Agnostic Command & Control That Won't Die

Francine Solheim
Room 4- OWASP
Breaking the Black Box: Why Testing Generative AI Is Full Spectrum

Jason Ross
Room 5
Part 2/2: Securing your AI code generation workflow

Armin Buescher

Erlend Oftedal
11:40 - 12:40 (UTC+01)
Room 1
The Risky Business, of AI Illiteracy

Sean Juroviesky
Room 2
Hijacking Google’s CI/CD Through Prompt Injection: The New Era of AI-Based Exploits

Mackenzie Jackson
Room 3
From WAN to NAS: A Pwn2Own Journey Through the SOHO Attack Surface

Daan Keuper
Room 4- OWASP
OWASP Juice Shop: Take your security vitamins!

Jannik Hollenbach

Björn Kimminich
Room 5
Part 1/2: Introduction to the new post-quantum standards

Tjerand Silde
13:40 - 14:40 (UTC+01)
Room 1
Connecting the dots to go from tabular security incident data to behavioral graph understanding

Sindre Breda

Manfred Cheung
Room 2
Worms in our software supply chain - Where do we go from here?

Charlie Eriksen
Room 3
Attacking AI

Jason Haddix
Room 4- OWASP
AppSec Security: The SDLC in the age of agentic

Jon Mccoy
Room 5
Part 2/2: Introduction to the new post-quantum standards

Tjerand Silde
15:00 - 16:00 (UTC+01)
Room 1
Learning security monitoring through failure

Truls Dahlsveen
Room 2
Anti-Patterns: How to Not implement a Cloud Security tool

Johan Paramanathan
Room 3
Secure and Compliant APIs - By Design

Daniel Sandberg

Tobias Ahnoff
Room 4- OWASP
It is rough without a WAF

José Carlos Chávez
Room 5
Part 1/2: Games as tools for scaling your application security program

Johan Sydseter
16:20 - 17:20 (UTC+01)
Room 1
Supercharging Incident Response: Practical Automation and AI-Driven Investigations

Giorgio Perticone
Room 2
What's New in ASVS V5

Eden Yardeni
Room 3
BOLA, BOPLA, and BFLA: Let’s get rid of broken authorization!

Eivind Jahr Kirkeby
Room 4
Who Gave the Agent Admin Rights?! Securing Cloud & AI Machine Identities

Bodhisattva Das
Room 5
Part 2/2: Games as tools for scaling your application security program
