{ } NDC Conferences
About us
Dark
Light
Course Calendar
Sort after topic
Oct 10
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Joe DeCock
3 days
Online - 8am - 4pm Central Time
1 690 USD
Register
Oct 16
NDC Porto 2023
16 - 20 October 2023
80
Speakers
40
Technologies
6
Workshops
90
Talks
Oct 18
Connect remotely like a pro! Hack VPNs, avoid firewalls, connect even when your machine is down
Adam Furmanek
1 hour
-
Oct 18
Quantum Computing and the future of cryptography
Filip W.
1 hour
-
Oct 18
Human vs AI: How to ship secure code
Joseph Katsioloudes
1 hour
Alfândega Porto Congress Centre
-
Oct 18
Navigating the Cloud Native Security Landscape
Pablo Musa
1 hour
-
Oct 19
Part 1/2: Securing your .NET application software supply-chain, the practical approach!
Niels Tanis
1 hour
-
Oct 19
Part 2/2: Securing your .NET application software supply-chain, the practical approach!
Niels Tanis
1 hour
-
Oct 19
Access control in message-driven systems
Marc Klefter
1 hour
-
Oct 19
GitHub + Azure: Better Together!
April Edwards
1 hour
Alfândega Porto Congress Centre
-
Oct 20
Using WebAssembly to run, extend, and secure your .NET application
Niels Tanis
1 hour
-
Jan 8
NDC Security Oslo 2024
8 - 11 January 2024
40
Speakers
15
Technologies
6
Workshops
40
Talks
Jan 8
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Anders Abel
2 days
Radisson Blu Scandinavia Hotel
12 990 NOK
Register
Jan 8
Hack Yourself First: How to go on the Cyber-Offence
Scott Helme
2 days
Radisson Blu Scandinavia Hotel
12 990 NOK
Register
Jan 8
Bulletproof APIs: Hands-On API Security
Philippe De Ryck
2 days
Radisson Blu Scandinavia Hotel
12 990 NOK
Register
Jan 8
(In)Secure C++: Sec Edition
Patricia Aas
2 days
Radisson Blu Scandinavia Hotel
12 990 NOK
Register
Jan 8
Building a High-Value AppSec Scanning Programme
Josh Grossman
2 days
Radisson Blu Scandinavia Hotel
12 990 NOK
Register
Jan 10
52 mins from initial access to ransomware -- is your defensive team ready?
Maarten Goet
1 hour
-
Jan 10
The Future of Cookies
Anders Abel
1 hour
Radisson Blu Scandinavia Hotel
-
Jan 29
NDC London 2024
29 January - 2 February 2024
100
Speakers
50
Technologies
12
Workshops
95
Talks
Jan 29
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Anders Abel
2 days
Queen Elizabeth II Centre
1 290 GBP
Register
Jan 29
Hack Yourself First: How to go on the Cyber-Offence
Scott Helme
2 days
Queen Elizabeth II Centre
1 290 GBP
Register
Jan 29
Awesome Azure Authentication Adventures
Glenn F. Henriksen
2 days
Queen Elizabeth II Centre
1 290 GBP
Register
Jan 31
2FA2Furious: New Threats to MFA
Nathaniel Okenwa
1 hour
-
Feb 1
Using Intent Based Access Control to Achieve Zero-Trust Deployments
David G. Simmons
1 hour
-
Feb 1
Drones, RemoteID and the Thrilling Future of UAS Flight
Heather Downing
1 hour
-
Feb 2
Not all attacks are malicious: DDoS from outside and within
Ingrid Guren, John Arne S. Pedersen
1 hour
-
Feb 2
The Future of Cookies
Anders Abel
1 hour
-
Feb 2
Keep your nose out of it. Denying yourself access to production
Glenn F. Henriksen
1 hour
-
Feb 2
How hacking works - Web edition
Espen Sande-Larsen
1 hour
Queen Elizabeth II Centre
-
Feb 12
NDC Sydney 2024
12 - 16 February 2024
90
Speakers
10
Workshops
40
Technologies
100
Talks
Jun 10
NDC Oslo 2024
10 - 14 June 2024
160
Speakers
45
Technologies
17
Workshops
170
Talks
On demand courses
Lessons From Billions of Breached Records
Troy Hunt
-
Contact us
OAuth and the long way to Proof of Possession
Dominick Baier, Steinar Noem
-
Contact us
Securing Serverless Applications in Azure
Sjoukje Zaal
-
Contact us
Creating a hybrid and multi-cloud strategy using Azure API Management
Eldert Grootenboer
-
Contact us
Biometric security in the Azure Cloud
Stefano Tempesta
-
Contact us
A Deep Dive Into SameSite Cookies, What They Are and Why They Matter
Stephen Rees-Carter
-
Contact us
The Rise of Software Supply-Chain Attacks – How Secure is your .NET Application?
Niels Tanis
-
Contact us
Demystifying Front-End Security
Ilya Verbitskiy
-
Contact us
Common mistakes and misconceptions in Web Application Security using OAuth 2.0 and OpenId Connect
Nahid Farrokhi
-
Contact us
Using GraphQL as a Secure Innovation Boundary and data-driven culture driver
Rob Moore, Sam Curry, Kieran Jacobsen
-
Contact us
Lightning Talks
Rebecca Platt, Kieran Jacobsen, Emad Alashi, Wing Ho
-
Contact us
The Rise of Software Supply-Chain Attacks – How Secure is your .NET Application?
Niels Tanis
-
Contact us
HTTP Security Headers You Need To Have On Your Web Apps
Scott Sauber
-
Contact us
Service Principals and Managed Identities - the Identity tools every Azure developer should know
Christos Matskas
-
Contact us
How to secure your GitHub Actions
Rob Bos
-
Contact us
Securing Multitenant Databases with Entity Framework Core
Zoran Horvat
-
Contact us
Everything is cyber-broken 3
Scott Helme, Troy Hunt
-
Contact us
How to develop to be compliant with OAuth 2.1 out of the gate
Nahid Farrokhi
-
Contact us
Authentication and Authorization in Blazor
Marco De Sanctis
-
Contact us
Forget about OAuth 2.0. Here comes OAuth 2.1
Philippe De Ryck
-
Contact us
Securing Serverless Applications in Azure
Sjoukje Zaal
-
Contact us
Passwords are so 1990
Sam Bellen
-
Contact us
Demonstrating binary exploitation with a recent vulnerability
Christian Resell, Marit Iren Rognli Tokle
-
Contact us
Demonstrating binary exploitation with a recent vulnerability
Christian Resell, Marit Iren Rognli Tokle
-
Contact us
Sandboxing a Linux application
Martin Ertsås
-
Contact us
Managing your settings in a secure way using Azure App Configuration
Cecilia Wirén
-
Contact us
Securing your .NET application software supply-chain
Niels Tanis
-
Contact us
HelseID - Introducing Modern Web Security in a Geriatric Health Sector
Dag Helge Østerhagen, Rune Andreas Grimstad
-
Contact us
Implement defence in depth for your .NET API:s
Tobias Ahnoff, Martin Altenstedt
-
Contact us
Using the BFF pattern to secure SPA and Blazor Applications
Dominick Baier
-
Contact us
Securing React with Trusted Types
Philippe De Ryck
-
Contact us
Lightning Talks
Lars Jakobsen, Matěj 'Horm' Horák, Ruby Jane Cabagnot
-
Contact us
Next level security for your Azure applications
Jan de Vries
-
Contact us
Securing your .NET application software supply-chain
Niels Tanis
-
Contact us
Serverless Patterns Made Simple with Real World Usecases
Sheen Brisals
-
Contact us
You Shall Not Password: Modern Authentication for Web Apps
Eli Holderness
-
Contact us
Capture the Flag - Kubernetes Edition - Part I
Andrew Martin
-
Contact us
Awesome Azure Authentication Adventures
Glenn F. Henriksen
-
Contact us
The Abridged History of Application Security
Jim Manico
-
Contact us
Securing SPAs and Blazor Applications using the BFF (Backend for Frontend) Pattern
Dominick Baier
-
Contact us
The Adoption and Operation of Serverless at LEGO.com
Sheen Brisals, Luke Hedger
-
Contact us
The Microsoft Graph: the way to build secure and intelligent apps
Sjoukje Zaal
-
Contact us
Sandboxing .NET assemblies for fun, profit and of course security!
Niels Tanis
-
Contact us
Embrace chaos to achieve stability
René van Osnabrugge
-
Contact us
Application security from start to finish
Michael Kaufmann
-
Contact us
Securing SPAs and Blazor Applications using the BFF (Backend for Frontend) Pattern
Anders Abel
-
Contact us
OAuth – the good Parts
Dominick Baier
-
Contact us
Secure Open Source Practices
Jillian Ratliff
-
Contact us
The OWASP Top Ten 2022 Release
Jim Manico
-
Contact us
The Last XSS Defense Talk
Jim Manico
-
Contact us
Keynote: The Abridged History of Application Security
Jim Manico
-
Contact us
Why you shouldn't trust me
Keerthana Ganesh, Shubham Patil
-
Contact us
How I designed the most efficient deepfake detector in the world with $100
Mathis Hammel
-
Contact us
Web APIs for delightful two factor auth experiences
Phil Nash
-
Contact us
eXential XSS (Cross Site Scripting)
Alex Mackey
-
Contact us
The Return of the Authentication Cookie
Anders Abel
-
Contact us
Defensive Coding Bootcamp
Heather Downing
-
Contact us
Vulnerability Exists Between Keyboard and Chair
Stephen Rees-Carter
-
Contact us
JWT! What is it good for? Absolutely everything (almost)!
Ben Dechrai
-
Contact us
Avoiding DNS Pain
Kieran Jacobsen
-
Contact us
Understanding the Cyber Security Acronym Soup
Kieran Jacobsen
-
Contact us
The Curious Incident in your Software in the Day-Time
Liam Westley
-
Contact us
So long, Secure Coding
Laura Bell
-
Contact us
Developing Flexible Authorisation Capabilities in ASP.NET Core
Jason Taylor
-
Contact us
The Good, the Bad, and the NPM Package: Supply Chain Attacks and How to Protect Your App
Feross Aboukhadijeh
-
Contact us
Smarter Everything with ML & the IoT
Brandon Satrom
-
Contact us
Containers as an Illusion - Part I
Michael Kerrisk
-
Contact us
Signed Integers Considered Harmful
Robert Seacord
-
Contact us
Best-practices for securing your Azure Container Services
Sjoukje Zaal
-
Contact us
Death by downtime
Rune Andreas Grimstad, Dag Helge Østerhagen
-
Contact us
Analysis of Real World Apps with Frida
Kyle Ossinger
-
Contact us
Secret Management: The Soft Way
Lian Li
-
Contact us
What happens if I change this URI… oooooh
Halvor Sakshaug
-
Contact us
Defensive Coding Bootcamp
Heather Downing
-
Contact us
The Hand That Feeds - How to Misuse Kubernetes
Lewis Denham-Parry
-
Contact us
How we secure NAV.no and 1/3 of Norway's national budget
Hans Kristian Flaatten
-
Contact us
Building Secure Microservices in Azure
Jimmy Bogard
-
Contact us
Formal verification of C# smart contracts
Allister Beharry
-
Contact us
You Shall Not Password: Modern Authentication for Web Apps
Eli Holderness
-
Contact us
Vulnerability Exists Between Keyboard and Chair
Stephen Rees-Carter
-
Contact us
Forget about OAuth 2.0. Here comes OAuth 2.1
Philippe De Ryck
-
Contact us
OAuth – the good Parts
Anders Abel
-
Contact us
Lightning Talks
Iryna Zelenetska, Hallstein Brøtan, Einar Høst
-
Contact us
Sandboxing .NET assemblies for fun, profit and of course security!
Niels Tanis
-
Contact us
Securing your .NET application software supply-chain
Niels Tanis
-
Contact us
Part 1/2: Build your own Secure Messenger
Ben Dechrai
-
Contact us
The state of passwordless auth on the web
Phil Nash
-
Contact us
JWT! What is it good for? Absolutely everything (almost)!
Ben Dechrai
-
Contact us
So long, Secure Coding
Laura Bell
-
Contact us
Cyber Broken
Scott Helme
-
Contact us
From Application Security to Developer Security – Shift left with GitHub Advanced Security
Michael Kaufmann
-
Contact us
How to steal Azure DevOps secrets
Björn Weström
-
Contact us
Part 1/2: How to use Microsoft's Graph API
George Coldham, Michelle Sandford
-
Contact us
NOPASSWD: Building a Passwordless Cloud Infrastructure
Kyle Kotowick
-
Contact us
Securing your .NET application software supply-chain, the practical approach!
Niels Tanis
-
Contact us
Developing Flexible Authorisation Capabilities in ASP.NET Core
Jason Taylor
-
Contact us
Getting API security right
Philippe De Ryck
-
Contact us
Defensive Coding Bootcamp
Heather Downing
-
Contact us
Return Oriented Programming, an introduction
Patricia Aas
-
Contact us
Hyper Speed! When Big Data Blooms
Scott Helme
-
Contact us
Secure Coding in C and C++
Robert Seacord
-
Contact us
C++ Best Practices
Jason Turner
-
Contact us
Defending Kubernetes Environments: A Hands-On Approach
Jimmy Mesta
-
Contact us
Hacked on national television
Linus Kvarnhammar
-
Contact us
What the Premier League can teach us about Zero Trust Security
Michal Davidson
-
Contact us
Build a Secure Developer Platform Using Argo, Istio and Vault.
Jona Apelbaum, Alessandro Vozza
-
Contact us
NOPASSWD: Building a Passwordless Cloud Infrastructure
Kyle Kotowick
-
Contact us
Don't Panic: A Developer's Guide to Building Secure GraphQL APIs
Meenakshi Dhanani
-
Contact us
Don’t Throw Away the Key: What Developers Should Know about Encryption
Liz Moy
-
Contact us
CDNs 101: An Introduction to Content Delivery Networks
Jake Ginnivan
-
Contact us
Automating your DNS
Vatsalya Goel
-
Contact us
OAuth2 on a national level - how to secure extremely sensitive apis
Rune Andreas Grimstad
-
Contact us
Emerging threats against cloud application identities and what you should do about it
Sarah Young
-
Contact us
Stories from DART: Taking the ware out of ransomware
Sarah Young, Jennifer Elliott
-
Contact us
How hacking works
Espen Sande-Larsen
-
Contact us
Part 1/2: Securing Container Supply Chain Workshop
Hans Kristian Flaatten, Jan-Kåre Solbakken, Youssef Bel Mekki
-
Contact us
Flexible Authorisation with ASP.NET Core 7.0
Jason Taylor
-
Contact us
Abusing GitHub for fun and profit: Actions and Codespaces Security
Magno Logan, Nitesh Surana
-
Contact us
AI for Inclusive Society - Responsible AI
Yashoda Singh
-
Contact us
Did I break prod?
Ewelina Wilkosz
-
Contact us
How complex software impacts your cognitive abilities
Corstian Boerman
-
Contact us
Are your secrets secure? - How mobile applications are leaking millions of credentials
Mackenzie Jackson
-
Contact us
Monorepo – How to do frontend faster, better and safer
Kari Meling Johannessen
-
Contact us
Warpforge: Decentralized supply chain management for building... Everything!
Eric Myhre
-
Contact us
Transformation Blueprint for Developer-Centric Application Security
Larry Maccherone
-
Contact us
OAuth and Proof of Possession - The long way round
Dominick Baier
-
Contact us
The OWASP Top Ten 2022 Release
Jim Manico
-
Contact us
How AI is impacting cybersecurity. Does it?
Victoria Almazova
-
Contact us
Part 2/2: Securing Container Supply Chain Workshop
Hans Kristian Flaatten, Jan-Kåre Solbakken, Youssef Bel Mekki
-
Contact us
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
Scott Helme
-
Contact us
Lightning Talks 3
Erik André Jakobsen, Tor Kristen Haugen
-
Contact us
An engineer's guide to Linux Kernel upgrades
Ignat Korchagin
-
Contact us
What is Linux kernel keystore and why you should use it in your next application
Ignat Korchagin
-
Contact us
You Shall Not Password: Modern Authentication for Web Apps
Eli Holderness
-
Contact us
SLSA, SigStore, SBOM and Software Supply Chain Security. What does that all mean really ?
Abdel Sghiouar
-
Contact us
GitHub + Azure: Better Together!
April Edwards
-
Contact us
Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack
Scott Helme
-
Contact us
Safer C++ with MISRA-C++ 2023
Peter Sommerlad
-
Contact us
Secure development with C++ - Lessons and techniques
Helge Penne
-
Contact us
Keynote: Safety and Security: The Future of C and C++
Robert Seacord
-
Contact us
Part 2/2: How to use Microsoft's Graph API
Michelle Sandford, George Coldham
-
Contact us
High Security OAuth
Dominick Baier, Brock Allen
-
Contact us
Secure Programming for the Enterprise in .NET, .NET Core and Future
Stephen Haunts
-
Contact us
A builder’s guide to Single Page Application security
Philippe De Ryck
-
Contact us
Workshop: Securing (and Observing) Kubernetes clusters with Cilium and eBPF - Part 2/2
Hans Kristian Flaatten, Øyvind Randa
-
Contact us
Building Secure API's and Web Applications
Philippe De Ryck
-
Contact us
The Hows and Whys of Running Our Own OpenidConnect Identity Provider
Roland Guijt
-
Contact us
TLS/HTTPS Security for Web Developers
Scott Helme
-
Contact us
OAuth, OpenID Connect and .NET – the Good Parts
Joe DeCock
-
Contact us
How AI is impacting cybersecurity. Does it?
Victoria Almazova
-
Contact us
Keynote: Crypto means Cryptography!
Scott Helme
-
Contact us
Build your own application security program
Laura Bell
-
Contact us
A Builder's Guide to Securing Modern Applications
Philippe De Ryck
-
Contact us
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Brock Allen, Joe DeCock
-
Contact us
Web Hacking Workshop
Linus Kvarnhammar
-
Contact us
Hyper Speed! When Big Data Blooms
Scott Helme
-
Contact us
Building Secure API's and Web Applications
Jim Manico
-
Contact us
Part 2/2: Securing your .NET application software supply-chain, the practical approach!
Niels Tanis
-
Contact us
Secure Programming for the Enterprise in .NET Framework / .NET Core
Stephen Haunts
-
Contact us
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Dominick Baier, Anders Abel
-
Contact us
Zen and the Art of Code Life Cycle Maintenance
Phil Nash
-
Contact us
OAuth, OpenID Connect & .NET – the Good Parts
Dominick Baier
-
Contact us
Secure Coding in C and C++
Robert Seacord
-
Contact us
Part 1/2: Securing your .NET application software supply-chain, the practical approach!
Niels Tanis
-
Contact us
API security for developers
Philippe De Ryck
-
Contact us
OAuth in 2021 – What’s up?
Dominick Baier
-
Contact us
Secure Programming for the Enterprise in .NET and .NET Core
Stephen Haunts
-
Contact us
Architecting Fortresses: A Deep Dive into Advanced Security Measures for ReactJS Applications
Jim Manico
-
Contact us
Advanced Security Design: Threat Modeling Masterclass
Avi Douglen
-
Contact us
Getting API security right
Philippe De Ryck
-
Contact us
(In)Security in C++
Patricia Aas
-
Contact us
Workshop: Securing (and Observing) Kubernetes clusters with Cilium and eBPF - Part 1/2
Hans Kristian Flaatten, Øyvind Randa
-
Contact us
Keynote: Unicorn Hunting
Mikko Hypponen
-
Contact us
Threat Assessment for Software Architects
Erica Anderson, Laura Bell
-
Contact us
The OWASP Top Ten for Developers
Jim Manico
-
Contact us
Building Scalable and Maintainable APIs with ASP.NET Core Workshop
Spencer Schneidenbach
-
Contact us
Batten Down the Hatches! A Cluster Security Journey
Jimmy Mesta, Steve Wade
-
Contact us
Architecting Fortresses: A Deep Dive into Advanced Security Measures for ReactJS Applications
Jim Manico
-
Contact us
Part 2/2: Build your own Secure Messenger
Ben Dechrai
-
Contact us
Creating a hybrid and multi-cloud strategy using Azure API Management
Eldert Grootenboer
-
Contact us
Linux Security and Isolation APIs Fundamentals
Michael Kerrisk
-
Contact us
NDC Conferences uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it