{ } NDC Conferences
About us
Dark
Light
Course Calendar
Sort after topic
Jan 26
NDC London 2026
26 - 30 January 2026
100
Speakers
50
Technologies
12
Workshops
110
Talks
Mar 2
NDC Security Oslo 2026
2 - 5 March 2026
50
Speakers
Technologies
8
Workshops
60
Talks
Mar 4
Part 1/2: Hack your own pipeline (before someone else does)
Jan-Kåre Solbakken, Emil Albrektsson
1 hour
-
Mar 4
Part 2/2: Hack your own pipeline (before someone else does)
Jan-Kåre Solbakken, Emil Albrektsson
1 hour
-
Mar 4
Lightning Talks 1
Mackenzie Jackson, Cody Burkard, Håvard Eide, Patricia R
1 hour
-
Mar 4
What we can learn from the World's Biggest Heists
James Birnie
1 hour
-
Mar 5
The server that talked back: a deep dive into SSRFs
Sofia Lindqvist
1 hour
Radisson Blu Scandinavia Hotel
-
Mar 5
Is Your Approach to Pipeline Security Flawed? Rethinking CI/CD Security
Patricia R
1 hour
-
Mar 5
Prompt Injection Attacks in LLM-Powered Applications
Magno Logan
1 hour
-
Mar 5
From WAN to NAS: A Pwn2Own Journey Through the SOHO Attack Surface
Daan Keuper
1 hour
-
Mar 5
Protocol-Hopping C2: Transport-Agnostic Command & Control That Won't Die
Francine Solheim
1 hour
-
Mar 5
Has your flight been cancelled? You might be eligible for a cybersec session!
Konstantinos Fouzas
1 hour
-
Apr 22
NDC Sydney 2026
22 - 24 April 2026
60
Speakers
8
Workshops
40
Technologies
70
Talks
May 5
NDC Toronto 2026
5 - 8 May 2026
8
Workshops
65
Speakers
90
Talks
Jun 1
NDC Copenhagen 2026
1 - 4 June 2026
70
Speakers
40
Technologies
80
Talks
10
Workshops
Sept 14
NDC Oslo 2026
14 - 18 September 2026
150
Speakers
45
Technologies
12
Workshops
160
Talks
Sept 21
NDC TechTown 2026
21 - 24 September 2026
50
Speakers
15
Technologies
10
Workshops
60
Talks
On demand courses
Flipping Bits: Your Credentials Are Certainly Mine
Stök ., Joona Hoikkala
-
Contact us
Attacking through the Software Supply Chain
Felix Leder
-
Contact us
How hacking works - Web Edition
Espen Sande-Larsen
-
Contact us
What happens if I change this URI… oooooh
Halvor Sakshaug
-
Contact us
Security as Code: A DevSecOps Approach
Joseph Katsioloudes
-
Contact us
Hacking the Juice Shop
Cecilia Wirén
-
Contact us
Agile Whiteboard Hacking – aka Hands-on Threat Modeling
Georges Bolssens
-
Contact us
Hacker vs Azure Web Application Firewall
Laura Kokkarinen
-
Contact us
Surprising ways to escalate privileges in Entra ID
Marius Solbakken Mellum
-
Contact us
Banking Cybersecurity: Battling DeepFakes & AI-powered Scammers
George Proorocu
-
Contact us
Prompt Injection: When Hackers Befriend Your AI
Vetle Hjelle
-
Contact us
OWASP Juice Shop - An Open Source Software and security Fairytale
Björn Kimminich
-
Contact us
Spoofing Commands - Can You Trust Process Creation Logs?
Tristan Bennett
-
Contact us
Inside Google's Discovery and Remediation of a Critical CPU Vulnerability
Yousif Hussin
-
Contact us
Hack the Planet! What Movies can Teach Us about InfoSec
Simon Painter
-
Contact us
Building a lightning fast Firewall with Java & eBPF
Johannes Bechberger
-
Contact us
Cyber warfare evolution: lessons from two years of russo-Ukrainian war
Anton Dykyi
-
Contact us
Start covering your bases & Stop chasing APT headlines
Avishay Zawoznik
-
Contact us
Privilege Escalation in Microsoft Azure
Christian August Holm Hansen
-
Contact us
GitHub Actions: A Cloudy Day for Security
Sofia Lindqvist
-
Contact us
Hacking History: The first computer worm
Håvard Opheim
-
Contact us
Stories from NC3 - investigating hackers
Sindre Breda, Åge Strand
-
Contact us
NDC Conferences uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it