{ } NDC Conferences
About us
Dark
Light
Course Calendar
Sort after topic
May 19
NDC Oslo 2025
19 - 23 May 2025
150
Speakers
45
Technologies
20
Workshops
160
Talks
Sept 8
NDC Copenhagen 2025
8 - 12 September 2025
100
Speakers
40
Technologies
100
Talks
10
Workshops
Sept 22
NDC TechTown 2025
22 - 25 September 2025
50
Speakers
15
Technologies
10
Workshops
60
Talks
Oct 13
Azure Dev Summit 2025
13 - 16 October 2025
Oct 20
NDC Porto 2025
20 - 24 October 2025
80
Speakers
40
Technologies
8
Workshops
90
Talks
Nov 11
NDC AI 2025
11 - 13 November 2025
Dec 1
AI Red Teaming in Practice
Gary Lopez
2 days
Hilton Deansgate - Manchester
-
On demand courses
Flipping Bits: Your Credentials Are Certainly Mine
Stök ., Joona Hoikkala
-
Contact us
Attacking through the Software Supply Chain
Felix Leder
-
Contact us
How hacking works - Web Edition
Espen Sande-Larsen
-
Contact us
What happens if I change this URI… oooooh
Halvor Sakshaug
-
Contact us
Security as Code: A DevSecOps Approach
Joseph Katsioloudes
-
Contact us
Hacking the Juice Shop
Cecilia Wirén
-
Contact us
Agile Whiteboard Hacking – aka Hands-on Threat Modeling
Sebastien Deleersnyder
-
Contact us
Hacker vs Azure Web Application Firewall
Laura Kokkarinen
-
Contact us
Surprising ways to escalate privileges in Entra ID
Marius Solbakken Mellum
-
Contact us
Banking Cybersecurity: Battling DeepFakes & AI-powered Scammers
George Proorocu
-
Contact us
Prompt Injection: When Hackers Befriend Your AI
Vetle Hjelle
-
Contact us
OWASP Juice Shop - An Open Source Software and security Fairytale
Björn Kimminich
-
Contact us
Spoofing Commands - Can You Trust Process Creation Logs?
Tristan Bennett
-
Contact us
Inside Google's Discovery and Remediation of a Critical CPU Vulnerability
Yousif Hussin
-
Contact us
Hack the Planet! What Movies can Teach Us about InfoSec
Simon Painter
-
Contact us
Building a lightning fast Firewall with Java & eBPF
Johannes Bechberger
-
Contact us
Cyber warfare evolution: lessons from two years of russo-Ukrainian war
Anton Dykyi
-
Contact us
Start covering your bases & Stop chasing APT headlines
Avishay Zawoznik
-
Contact us
Privilege Escalation in Microsoft Azure
Christian August Holm Hansen
-
Contact us
GitHub Actions: A Cloudy Day for Security
Sofia Lindqvist
-
Contact us
Hacking History: The first computer worm
Håvard Opheim
-
Contact us
Stories from NC3 - investigating hackers
Sindre Breda, Åge Strand
-
Contact us
NDC Conferences uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it