{ } NDC Conferences
About us
Dark
Light
Course Calendar
Sort after topic
Jan 26
NDC London 2026
26 - 30 January 2026
100
Speakers
50
Technologies
12
Workshops
110
Talks
Mar 2
NDC Security Oslo 2026
2 - 5 March 2026
50
Speakers
Technologies
8
Workshops
60
Talks
Mar 4
Securing LLM-Powered Applications: Overcoming Security and Privacy Challenges
Brian Vermeer
1 hour
-
Mar 4
Lightning Talks 1
Mackenzie Jackson, Cody Burkard, Håvard Eide, Patricia R
1 hour
-
Mar 5
AI’n’t Very Clear: Bad Language, Worse Governance (A Lesson from Cybersecurity)
Lianne Potter
1 hour
-
Mar 5
Part 1/2: Securing your AI code generation workflow
Armin Buescher
1 hour
-
Mar 5
Prompt Injection Attacks in LLM-Powered Applications
Magno Logan
1 hour
-
Mar 5
Part 2/2: Securing your AI code generation workflow
Armin Buescher
1 hour
Radisson Blu Scandinavia Hotel
-
Mar 5
MCP Security: Keep Your AI Agents from Spilling the Tea
Awar Abdulkarim, Manfred Bjørlin
1 hour
-
Mar 5
Supercharging Incident Response: Practical Automation and AI-Driven Investigations
Giorgio Perticone
1 hour
-
Apr 22
NDC Sydney 2026
22 - 24 April 2026
60
Speakers
8
Workshops
40
Technologies
70
Talks
May 5
NDC Toronto 2026
5 - 8 May 2026
8
Workshops
65
Speakers
90
Talks
Jun 1
NDC Copenhagen 2026
1 - 4 June 2026
70
Speakers
40
Technologies
80
Talks
10
Workshops
Sept 14
NDC Oslo 2026
14 - 18 September 2026
150
Speakers
45
Technologies
12
Workshops
160
Talks
Sept 21
NDC TechTown 2026
21 - 24 September 2026
50
Speakers
15
Technologies
10
Workshops
60
Talks
On demand courses
Fundamentals of Privacy Engineering
Samuel Kelemen
-
Contact us
Lost and Found in Translation: An intro to ML assisted decompilation and deobfuscation
Camilla Montonen
-
Contact us
Agile Whiteboard Hacking – aka Hands-on Threat Modeling
Georges Bolssens
-
Contact us
Navigating the Security and Privacy Landscape of Modern AI
Vera Rimmer
-
Contact us
RAG Against the Machine
Brennan Lodge
-
Contact us
Cybersecurity in the Era of AI and Quantum Computing
Tudor Damian
-
Contact us
Homoglyph-Based Attacks: Circumventing LLM Detectors
Aldan Creo
-
Contact us
Using GenAI on your code, what could possibly go wrong?
Niels Tanis
-
Contact us
MCP Demystified
Matthew Livesey
-
Contact us
Advanced Autonomous AI Agents: Memory, Collaboration and Evolution in Action
Andreas Wänqvist
-
Contact us
AI’s Hidden History: Unpacking Bias, Power, and the Builders Who Shaped It
Lianne Potter
-
Contact us
Supercharging DevOps with MCP (Without Opening a Security Hole)
Alex Shershebnev
-
Contact us
Observing AI Applications with OpenLit and OpenTelemetry
Carly Richmond
-
Contact us
Beyond the Pink: Data Risks in Femtech You Can’t Ignore
Arohi Naik
-
Contact us
STOIC Security: Shielding Your Generative AI App from the Five Deadly Risks
Jeff Watkins
-
Contact us
From Ancient Greeks to Modern Geeks - Basic Machine Learning Algorithms
Simon Painter
-
Contact us
Agents That Talk Back: MCP, ACP, A2A, Oh my!
Taswar Bhatti
-
Contact us
Skill Degradation: An Empirical Analysis of 400+ AI‑Generated Security Fixes
Pedram Hayati
-
Contact us
Prompt Hardening - Secure Code Generation Using AI
Sean Sinclair
-
Contact us
Browser Power: Building MCP Tools That Do Real Work
Lizzie Siegle
-
Contact us
Building Secure Infrastructure for Productive AI Agents
Jiachen Jiang
-
Contact us
ToolShell, Patch Bypass, and the AI That Might Have Seen It Coming
Soroush Dalili, Pedram Hayati
-
Contact us
How to Break AI Systems (Before Someone Else Does)
Gary Lopez, Amanda Minnich
-
Contact us
Lightning Talks
Chisom Nwokwu, Alexander Barabanov, Richard Brough
-
Contact us
NDC Conferences uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it