powered by
Partner Package
Sponsors & Partners
Call for Sponsors
Diversity Grant
Past Events
About
Media
Keep the overview!
MON
22. Feb.
TUE
23. Feb.
WED
24. Feb.
THU
25. Feb.
8:00
08:30 — 09:00
Registration
08:30 — 09:00 |
Registration
9:00
09:00 — 16:00
Mathias Tausig, Martin Grottenthaler
Bootcamp A: Hands-on AWS Cloud Security
09:00 — 16:00 |
Mathias Tausig, Martin Grottenthaler
- Bootcamp A: Hands-on AWS Cloud Security
09:00 — 16:00
Dimitrij Klesev, Filip Nikolic
Bootcamp C: Kubernetes Security Deep Dive
09:00 — 16:00 |
Dimitrij Klesev, Filip Nikolic
- Bootcamp C: Kubernetes Security Deep Dive
09:00 — 16:00
Philippe De Ryck
Bootcamp B: Hands-on API Security for Developers
09:00 — 16:00 |
Philippe De Ryck
- Bootcamp B: Hands-on API Security for Developers
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
20:00
21:00
22:00
8:00
9:00
09:00 — 12:00
Thomas Konrad
Software Security 101: Secure Coding Basics
09:00 — 12:00 |
Thomas Konrad
- Software Security 101: Secure Coding Basics
09:00 — 16:00
Dimitrij Klesev, Filip Nikolic
Bootcamp C: Kubernetes Security Deep Dive
09:00 — 16:00 |
Dimitrij Klesev, Filip Nikolic
- Bootcamp C: Kubernetes Security Deep Dive
09:00 — 16:00
Philippe De Ryck
Bootcamp B: Hands-on API Security for Developers
09:00 — 16:00 |
Philippe De Ryck
- Bootcamp B: Hands-on API Security for Developers
09:00 — 16:00
Mathias Tausig, Martin Grottenthaler
Bootcamp A: Hands-on AWS Cloud Security
09:00 — 16:00 |
Mathias Tausig, Martin Grottenthaler
- Bootcamp A: Hands-on AWS Cloud Security
10:00
11:00
12:00
13:00
14:00
15:00
16:00
17:00
18:00
19:00
19:30 — 22:30
Johanna Ullrich, Tanya Janca, + 13 weitere
Women In IT: We Are No Aliens!
19:30 — 22:30 |
Johanna Ullrich, Tanya Janca, + 13 weitere
- Women In IT: We Are No Aliens!
20:00
21:00
22:00
8:00
9:00
09:45 — 10:00
Welcome!
09:45 — 10:00 |
Welcome!
10:00
10:00 — 10:45
Philippe De Ryck
Token Security in Single Page Applications
10:00 — 10:45 |
Philippe De Ryck
- Token Security in Single Page Applications
10:45 — 11:30
Artem Bychkov
Know Your Tools: Quirks And Flaws Of Integrating SAST Into Your Pipeline
10:45 — 11:30 |
Artem Bychkov
- Know Your Tools: Quirks And Flaws Of Integrating SAST Into Your Pipeline
11:00
11:30 — 11:45
Break
11:30 — 11:45 |
Break
11:45 — 12:30
Thomas Kerbl
Mastering Security Requirements Engineering
11:45 — 12:30 |
Thomas Kerbl
- Mastering Security Requirements Engineering
12:00
12:30 — 13:30
Lunch Break
12:30 — 13:30 |
Lunch Break
13:00
13:30 — 14:15
Amir Sharif
Security Issues In OAuth/OIDC Implementations
13:30 — 14:15 |
Amir Sharif
- Security Issues In OAuth/OIDC Implementations
Powered by
14:00
14:15 — 15:00
Julien Vehent
Rapid Risk Assessment: A Lightweight Approach
14:15 — 15:00 |
Julien Vehent
- Rapid Risk Assessment: A Lightweight Approach
Powered by
15:00
15:00 — 15:30
Break
15:00 — 15:30 |
Break
15:30 — 16:15
Abdessamad Temmar
Catch Me If You can : Continuous Delivery vs. Security Assurance
15:30 — 16:15 |
Abdessamad Temmar
- Catch Me If You can : Continuous Delivery vs. Security Assurance
16:00
16:15 — 17:00
Pascal Schulz, Thomas Konrad, + 6 weitere
Breakout Sessions: Secure Software Design, Penetration Testing and Bug Bounty, DevSecOps
16:15 — 17:00 |
Pascal Schulz, Thomas Konrad, + 6 weitere
- Breakout Sessions: Secure Software Design, Penetration Testing and Bug Bounty, DevSecOps
17:00
17:00 — 17:15
Break
17:00 — 17:15 |
Break
17:15 — 18:00
Tanya Janca
Keynote: Security Metrics That Matter
17:15 — 18:00 |
Tanya Janca
- Keynote: Security Metrics That Matter
18:00
18:00 — 19:30
Networking
To be announced
18:00 — 19:30 |
Networking
- To be announced
19:00
20:00
21:00
22:00
8:00
9:00
09:45 — 10:00
Welcome!
09:45 — 10:00 |
Welcome!
10:00
10:00 — 10:45
Is My AI Racist? Or: How Not To Break The Law With Machine Learning & AI
10:00 — 10:45 |
- Is My AI Racist? Or: How Not To Break The Law With Machine Learning & AI
Powered by
10:45 — 11:30
Rudolf Mayer, Tanja Šarčević
Adversarial Machine Learning: How Secure Is Machine Learning?
10:45 — 11:30 |
Rudolf Mayer, Tanja Šarčević
- Adversarial Machine Learning: How Secure Is Machine Learning?
Powered by
11:00
11:30 — 11:45
Break
11:30 — 11:45 |
Break
11:45 — 12:30
Alexander Barabanov
What Information About The Application Architecture Needs To Be Collected For AppSec Purposes?
11:45 — 12:30 |
Alexander Barabanov
- What Information About The Application Architecture Needs To Be Collected For AppSec Purposes?
Powered by
12:00
12:30 — 13:30
Lunch Break
12:30 — 13:30 |
Lunch Break
13:00
13:30 — 14:15
Alexander Reelsen
Seccomp For Developers - Writing More Secure Applications
13:30 — 14:15 |
Alexander Reelsen
- Seccomp For Developers - Writing More Secure Applications
14:00
14:15 — 15:00
Reinhard Kugler
Let's Build And Break A Container By Hand Without Docker Or LXC
14:15 — 15:00 |
Reinhard Kugler
- Let's Build And Break A Container By Hand Without Docker Or LXC
15:00
15:00 — 15:30
Break
15:00 — 15:30 |
Break
15:30 — 16:15
Magno Logan
Kubernetes Security: Attacking and Defending K8s Clusters
15:30 — 16:15 |
Magno Logan
- Kubernetes Security: Attacking and Defending K8s Clusters
Powered by
16:00
16:15 — 17:00
Thomas Konrad, Reinhard Kugler, + 7 weitere
Breakout Sessions: Secure SDLC, Security Automation, Cloud Security
16:15 — 17:00 |
Thomas Konrad, Reinhard Kugler, + 7 weitere
- Breakout Sessions: Secure SDLC, Security Automation, Cloud Security
17:00
17:00 — 17:15
Break
17:00 — 17:15 |
Break
17:15 — 18:00
Alyssa Miller
So Happy Together: Making the Promise of DevSecOps a Reality
17:15 — 18:00 |
Alyssa Miller
- So Happy Together: Making the Promise of DevSecOps a Reality
18:00
19:00
20:00
21:00
22:00
×
Loading...