Log in to bookmark your favorites and sync them to your phone or calendar.
Welcome and Introd...
Introduction To Application Level Attacks 09:45 - 12:15
The OWASP Top Ten for Developers (Part 1) 13:15 - 15:15
The OWASP Top Ten for Developers (Part 2) 15:30 - 17:00
Closing Words
Registration, Gathering and Networking 08:30 - 09:30
Lunch (bring your own or buy on-site) 12:15 - 13:15
Break
Gathering, networking, wine and cheese 17:00 - 17:45
Opening
DNS Exfiltration or Why I threw... 18:00 - 18:30
Lessons Learned from My Path in... 18:30 - 19:00
Networking 19:00 - 19:30
Capture the Flag! 05 10:00 - 06 16:00
Opening 09:30 - 10:00
Opening Keynote - The Last XSS Defense Tal... 10:00 - 10:40
The Adventures of AV/IR and the Leaky Sandbox 10:45 - 11:30
JARVIS never saw it coming: Hacking machine lear... 11:45 - 12:30
Stackoverflow, the vulnerability... 12:30 - 13:00
Security is everybody's job... Literally. 14:00 - 14:45
Path Of LeAst Resistance - Accelerating the sear... 14:45 - 15:30
Exploiting Smart Contracts For Fun And Profit 15:45 - 16:30
Closing Keynote - A breach on your watch, do you... 16:30 - 17:15
Closing
Transition Break
Lunch break 13:00 - 14:00
(De)Serial Killers 10:45 - 11:30
How to hack cryptographic protocols with formal... 11:45 - 12:30
Attacking and Defending NFC Appl... 12:30 - 13:00
Is Your Mobile Application Storing Your Company... 14:00 - 14:45
Controlling the view controllers in iOS applicat... 14:45 - 15:30
Value Driven Threat Modeling 15:45 - 16:30
Writing security code in Node.js 10:45 - 11:30
One Push Too Far - Exploiting Web-Push notificat... 11:45 - 12:30
Achieving Least Privilege IAM Pe... 12:30 - 13:00
Serverless Authentication with JWT 14:00 - 14:45
Your Apps Have Gone Serverless. Has Your Securit... 14:45 - 15:30
Passwords are passé – WebAuthn is simpler, stron... 15:45 - 16:30
Capture the Flag! 08:00 - 16:00
Resume Review and CV Critique 13:30 - 15:30