{ } NDC Conferences
About us
Dark
Light
Course Calendar
Sort after topic
Jan 20
NDC Security 2025
20 - 23 January 2025
40
Speakers
20
Technologies
8
Workshops
50
Talks
Jan 20
Agile Whiteboard Hacking – aka Hands-on Threat Modeling
Sebastien Deleersnyder
2 days
Radisson Blu Scandinavia Hotel
13 490 NOK
Register
Jan 22
The Hidden Dangers of Incoherent Code: How Code Quality Impacts Security
Tav Herzlich
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 22
Flipping Bits: Your Credentials Are Certainly Mine
Stök ·, Joona Hoikkala
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 23
Inside Google's Discovery and Remediation of a Critical CPU Vulnerability
Yousif Hussin
1 hour
-
Jan 23
Start covering your bases & Stop chasing APT headlines
Avishay Zawoznik
1 hour
-
Jan 23
Tales of OAuth2/OIDC in the wild
Anders Abel
1 hour
-
Jan 23
Part 1: Securing Kubernetes: Practical Workflows and Tools for Enhanced Cluster Protection
Rabieh Fashwall
1 hour
-
Jan 23
Part 2: Securing Kubernetes: Practical Workflows and Tools for Enhanced Cluster Protection
Rabieh Fashwall
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 23
GitHub Actions: A Cloudy Day for Security
Sofia Lindqvist
1 hour
-
Jan 23
Without a Trace: Supply Chain Attacks in the Terraform Registry
Kyle Kotowick
1 hour
-
Jan 23
TPMs and the Linux Kernel: unlocking a better path to hardware security
Ignat Korchagin
1 hour
-
Jan 23
Privilege Escalation in Microsoft Azure
Christian August Holm Hansen
1 hour
-
Jan 27
NDC London 2025
27 - 31 January 2025
100
Speakers
50
Technologies
12
Workshops
110
Talks
Apr 29
NDC Melbourne 2025
29 April - 1 May 2025
40
Speakers
30
Technologies
10
Workshops
50
Talks
May 19
NDC Oslo 2025
19 - 23 May 2025
150
Speakers
45
Technologies
20
Workshops
160
Talks
Sept 8
Copenhagen Developers Festival 2025
8 - 12 September 2025
100
Speakers
5
Bands
100
Talks
10
Workshops
Sept 22
NDC TechTown 2025
22 - 25 September 2025
50
Speakers
15
Technologies
10
Workshops
60
Talks
On demand courses
What I learnt about automating security
George Coldham
-
Contact us
NOPASSWD: Building a Passwordless Cloud Infrastructure
Kyle Kotowick
-
Contact us
OPA everywhere! Exploring new opportunities in policy evaluation
Anders Eknert
-
Contact us
How hacking works - Web Edition
Espen Sande-Larsen
-
Contact us
Securely deploying Infrastructure as Code
Chris Ayers
-
Contact us
Hacker vs Azure Web Application Firewall
Laura Kokkarinen
-
Contact us
Surprising ways to escalate privileges in Entra ID
Marius Solbakken Mellum
-
Contact us
Automating security monitoring
Truls Dahlsveen
-
Contact us
AWS Security Reference Architecture: Visualize your security
Mohamed Wali
-
Contact us
The Top 10 List of Istio Security Risks and Mitigation Strategies
José Carlos Chávez
-
Contact us
Optimizing Cloud Detection & Response With Security Chaos Engineering
Kennedy Torkura
-
Contact us
Effects Malware hunting in Cloud environment
Filipi Pires
-
Contact us
Microsoft Security Copilot - your new best friend!
George Coldham
-
Contact us
Tune your Toolbox for Velocity and Value
Josh Grossman
-
Contact us
Detect threats and misconfigurations in your GCP environment and operationalize on findings
Brian Jung
-
Contact us
Container Security with Falco: A Quick Start Guide
Ayesha Kaleem
-
Contact us
NDC Party - Conference Reception + Panel: Will Application Security eat Cloud Security for lunch?
Shilpi Bhattacharjee, Tanya Janca, Ashish Rajan
-
Contact us
NDC Conferences uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it