26/11/2024
10:45
-
11:25
Smooth seas do not a good architect make
26/11/2024
11:35
-
12:15
Project strange: Reviving the internet's lost ideals with an Open Source Creation - IAM reimagined
26/11/2024
13:35
-
14:15
Secure by design: How DevSecOps supports data privacy compliance
26/11/2024
14:25
-
15:05
Navigating the perils of software supply chain attacks
26/11/2024
15:50
-
16:30
Adapt or perish: Pioneering adaptive cyber security frameworks for emerging technologies
27/11/2024
11:20
-
12:00
How to develop an AppSec program from ground up and some key learnings
27/11/2024
13:30
-
14:10
How delving into hacking has made me a better (more secure) programmer
27/11/2024
15:50
-
16:30
Threat modelling at the speed of Git
28/11/2024
10:15
-
10:55
Why a single source is not enough? A quantitative analysis of exploited vulnerabilities
28/11/2024
11:05
-
11:45
Designing secure systems: The art and science of threat modelling
28/11/2024
13:00
-
13:40
The agile security professional: Adapting to DevSecOps and SecDevOps in modern organisations
28/11/2024
13:50
-
14:30
From commit to compromise: How attackers exploit DevOps pipeline
No items found.