A door with no locks? Let’s talk about threat modeling
Talks grouped by Track
Defensive practices, tools and technologies to be secure
Title
Speakers
Track
Application security - Consistency is everything!
Catch the hacker among 70 billion events per day
End-to-End Encryption for Streaming Data Pipelines
Passkeys in practice: implementing passwordless apps
Post Quantum Encryption: Protecting Tomorrow's Grid Today
Pragmatic OpenID Connect
Securing LLM-Powered Applications: Overcoming Security and Privacy Challenges
The Enemy Within: How AI is Weaponizing Your Code