Talks grouped by Track
Hands‑on AppSec: threat modeling, secure defaults, secrets & identity, SAST/DAST/IAST, supply‑chain (SBOM, Sigstore), policy‑as‑code, AI security (prompt injection, data controls).
Title
Speakers
Track
Are We Ready For The Next Cyber Security Crisis Like Log4Shell?
Building Secure Software(Panel) : Practical Strategies for Developers
Deep dive into data streaming security
Securing RAG Pipelines with Fine Grained Authorization