{ } NDC Conferences
About us
Dark
Light
Course Calendar
Sort after topic
Mar 21
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Joe DeCock
3 days
Online - 09:00-17:00 EDT(UTC-4)
1 490 USD
Register
May 4
OAuth, OpenID Connect and .NET – the Good Parts
Joe DeCock
1 day
Online - 09:00-17:00 EDT(UTC-4)
700 USD
Register
May 22
NDC Oslo 2023
22 - 26 May 2023
160
Speakers
45
Technologies
17
Workshops
150
Talks
May 22
Hack Yourself First: How to go on the Cyber-Offence
Scott Helme
2 days
Oslo Spektrum
14 490 NOK
Register
May 22
The OWASP Top Ten 2022 Release
Jim Manico
2 days
Oslo Spektrum
14 490 NOK
Register
May 22
Awesome Azure Authentication Adventures
Glenn F. Henriksen
2 days
Oslo Spektrum
14 490 NOK
Register
May 22
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Dominick Baier, Anders Abel
2 days
Oslo Spektrum
14 490 NOK
Register
May 24
Hacked on national television
Linus Kvarnhammar
1 hour
Oslo Spektrum
-
May 24
The Future of Cookies
Anders Abel
1 hour
Oslo Spektrum
-
May 24
AI for Inclusive Society - Responsible AI
Yashoda Singh
1 hour
-
May 24
Warpforge: Decentralized supply chain management for building... Everything!
Eric Myhre
1 hour
-
May 24
Monorepo – How to do frontend faster, better and safer
Kari Meling Johannessen
1 hour
Oslo Spektrum
-
May 24
OAuth and Proof of Possession - The long way round
Dominick Baier
1 hour
Oslo Spektrum
-
May 24
Automating your DNS
Vatsalya Goel
1 hour
-
May 25
CDNs 101: An Introduction to Content Delivery Networks
Jake Ginnivan
1 hour
-
May 25
TBA - Scott Helme
Scott Helme
1 hour
Oslo Spektrum
-
May 25
Are your secrets secure? - How mobile applications are leaking millions of credentials
Mackenzie Jackson
1 hour
-
May 25
Abusing GitHub for fun and profit: Actions and Codespaces Security
Magno Logan, Nitesh Surana
1 hour
Oslo Spektrum
-
May 25
Lightning Talks 3
Erik André Jakobsen, Tor Kristen Haugen
0.75 hour
-
May 25
Don't Panic: A Developer's Guide to Building Secure GraphQL APIs
Meenakshi Dhanani
1 hour
-
May 25
Part 1/2: Securing Container Supply Chain Workshop
Hans Kristian Flaatten, Jan-Kåre Solbakken, Youssef Bel Mekki
1 hour
-
May 25
Transformation Blueprint for Developer-Centric Application Security
Larry Maccherone
1 hour
-
May 25
Part 2/2: Securing Container Supply Chain Workshop
Hans Kristian Flaatten, Jan-Kåre Solbakken, Youssef Bel Mekki
1 hour
-
May 25
Build a Secure Developer Platform Using Argo, Istio and Vault.
Jona Apelbaum, Alessandro Vozza
1 hour
Oslo Spektrum
-
May 25
Emerging threats against cloud application identities and what you should do about it
Sarah Young
1 hour
-
May 25
Flexible Authorisation with ASP.NET Core 7.0
Jason Taylor
1 hour
-
May 25
OAuth2 on a national level - how to secure extremely sensitive apis
Rune Andreas Grimstad
1 hour
-
May 26
How complex software impacts your cognitive abilities
Corstian Boerman
1 hour
-
May 26
Part 1/2: Build your own Secure Messenger
Ben Dechrai
1 hour
Oslo Spektrum
-
May 26
Part 2/2: Build your own Secure Messenger
Ben Dechrai
1 hour
Oslo Spektrum
-
May 26
Did I break prod?
Ewelina Wilkosz
1 hour
-
May 26
NOPASSWD: Building a Passwordless Cloud Infrastructure
Kyle Kotowick
1 hour
-
May 26
How hacking works - Web edition
Espen Sande-Larsen
1 hour
-
Aug 28
Copenhagen Developers Festival 2023
28 August - 1 September 2023
100
Speakers
5
Bands
100
Talks
10
Workshops
Aug 28
Hack Yourself First: How to go on the Cyber-Offence
Scott Helme
2 days
Øksnehallen | Kødbyen, CPH
8 900 DKK
Register
Sept 14
OAuth, OpenID Connect and .NET – the Good Parts
Joe DeCock
1 day
Online - 09:00-17:00 EDT(UTC-4)
700 USD
Register
Sept 18
NDC TechTown 2023
18 - 21 September 2023
50
Speakers
15
Technologies
10
Workshops
60
Talks
Sept 18
(In)Security in C++
Patricia Aas
2 days
Magazinet Kongsberg
12 490 NOK
Register
Sept 18
C++ Best Practices
Jason Turner
2 days
Magazinet Kongsberg
12 490 NOK
Register
Oct 16
NDC Porto 2023
16 - 20 October 2023
80
Speakers
40
Technologies
6
Workshops
90
Talks
Feb 12
NDC Sydney 2024
12 - 16 February 2024
90
Speakers
10
Workshops
40
Technologies
100
Talks
On demand courses
Lessons From Billions of Breached Records
Troy Hunt
-
Contact us
OAuth and the long way to Proof of Possession
Dominick Baier, Steinar Noem
-
Contact us
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Anders Abel
-
Contact us
Securing Serverless Applications in Azure
Sjoukje Zaal
-
Contact us
Creating a hybrid and multi-cloud strategy using Azure API Management
Eldert Grootenboer
-
Contact us
Biometric security in the Azure Cloud
Stefano Tempesta
-
Contact us
A Deep Dive Into SameSite Cookies, What They Are and Why They Matter
Stephen Rees-Carter
-
Contact us
The Rise of Software Supply-Chain Attacks – How Secure is your .NET Application?
Niels Tanis
-
Contact us
Demystifying Front-End Security
Ilya Verbitskiy
-
Contact us
Common mistakes and misconceptions in Web Application Security using OAuth 2.0 and OpenId Connect
Nahid Farrokhi
-
Contact us
Using GraphQL as a Secure Innovation Boundary and data-driven culture driver
Rob Moore, Sam Curry, Kieran Jacobsen
-
Contact us
Lightning Talks
Rebecca Platt, Kieran Jacobsen, Emad Alashi, Wing Ho
-
Contact us
The Rise of Software Supply-Chain Attacks – How Secure is your .NET Application?
Niels Tanis
-
Contact us
HTTP Security Headers You Need To Have On Your Web Apps
Scott Sauber
-
Contact us
Service Principals and Managed Identities - the Identity tools every Azure developer should know
Christos Matskas
-
Contact us
How to secure your GitHub Actions
Rob Bos
-
Contact us
Securing Multitenant Databases with Entity Framework Core
Zoran Horvat
-
Contact us
Everything is cyber-broken 3
Scott Helme, Troy Hunt
-
Contact us
How to develop to be compliant with OAuth 2.1 out of the gate
Nahid Farrokhi
-
Contact us
Authentication and Authorization in Blazor
Marco De Sanctis
-
Contact us
Forget about OAuth 2.0. Here comes OAuth 2.1
Philippe De Ryck
-
Contact us
Securing Serverless Applications in Azure
Sjoukje Zaal
-
Contact us
Passwords are so 1990
Sam Bellen
-
Contact us
Demonstrating binary exploitation with a recent vulnerability
Christian Resell, Marit Iren Rognli Tokle
-
Contact us
Demonstrating binary exploitation with a recent vulnerability
Christian Resell, Marit Iren Rognli Tokle
-
Contact us
Sandboxing a Linux application
Martin Ertsås
-
Contact us
Managing your settings in a secure way using Azure App Configuration
Cecilia Wirén
-
Contact us
Securing your .NET application software supply-chain
Niels Tanis
-
Contact us
HelseID - Introducing Modern Web Security in a Geriatric Health Sector
Dag Helge Østerhagen, Rune Andreas Grimstad
-
Contact us
Implement defence in depth for your .NET API:s
Tobias Ahnoff, Martin Altenstedt
-
Contact us
Using the BFF pattern to secure SPA and Blazor Applications
Dominick Baier
-
Contact us
Securing React with Trusted Types
Philippe De Ryck
-
Contact us
Lightning Talks
Lars Jakobsen, Matěj 'Horm' Horák, Ruby Jane Cabagnot
-
Contact us
Next level security for your Azure applications
Jan de Vries
-
Contact us
Securing your .NET application software supply-chain
Niels Tanis
-
Contact us
Serverless Patterns Made Simple with Real World Usecases
Sheen Brisals
-
Contact us
You Shall Not Password: Modern Authentication for Web Apps
Eli Holderness
-
Contact us
Capture the Flag - Kubernetes Edition - Part I
Andrew Martin
-
Contact us
Awesome Azure Authentication Adventures
Glenn F. Henriksen
-
Contact us
The Abridged History of Application Security
Jim Manico
-
Contact us
Securing SPAs and Blazor Applications using the BFF (Backend for Frontend) Pattern
Dominick Baier
-
Contact us
The Adoption and Operation of Serverless at LEGO.com
Sheen Brisals, Luke Hedger
-
Contact us
The Microsoft Graph: the way to build secure and intelligent apps
Sjoukje Zaal
-
Contact us
Sandboxing .NET assemblies for fun, profit and of course security!
Niels Tanis
-
Contact us
Embrace chaos to achieve stability
René van Osnabrugge
-
Contact us
Application security from start to finish
Michael Kaufmann
-
Contact us
Securing SPAs and Blazor Applications using the BFF (Backend for Frontend) Pattern
Anders Abel
-
Contact us
OAuth – the good Parts
Dominick Baier
-
Contact us
Secure Open Source Practices
Jillian Ratliff
-
Contact us
The Last XSS Defense Talk
Jim Manico
-
Contact us
Keynote: The Abridged History of Application Security
Jim Manico
-
Contact us
Why you shouldn't trust me
Keerthana Ganesh, Shubham Patil
-
Contact us
How I designed the most efficient deepfake detector in the world with $100
Mathis Hammel
-
Contact us
Web APIs for delightful two factor auth experiences
Phil Nash
-
Contact us
eXential XSS (Cross Site Scripting)
Alex Mackey
-
Contact us
The Return of the Authentication Cookie
Anders Abel
-
Contact us
Defensive Coding Bootcamp
Heather Downing
-
Contact us
Vulnerability Exists Between Keyboard and Chair
Stephen Rees-Carter
-
Contact us
JWT! What is it good for? Absolutely everything (almost)!
Ben Dechrai
-
Contact us
Avoiding DNS Pain
Kieran Jacobsen
-
Contact us
Understanding the Cyber Security Acronym Soup
Kieran Jacobsen
-
Contact us
The Curious Incident in your Software in the Day-Time
Liam Westley
-
Contact us
So long, Secure Coding
Laura Bell
-
Contact us
Developing Flexible Authorisation Capabilities in ASP.NET Core
Jason Taylor
-
Contact us
The Good, the Bad, and the NPM Package: Supply Chain Attacks and How to Protect Your App
Feross Aboukhadijeh
-
Contact us
Smarter Everything with ML & the IoT
Brandon Satrom
-
Contact us
Containers as an Illusion - Part I
Michael Kerrisk
-
Contact us
Signed Integers Considered Harmful
Robert Seacord
-
Contact us
Best-practices for securing your Azure Container Services
Sjoukje Zaal
-
Contact us
Death by downtime
Rune Andreas Grimstad, Dag Helge Østerhagen
-
Contact us
Analysis of Real World Apps with Frida
Kyle Ossinger
-
Contact us
Secret Management: The Soft Way
Lian Li
-
Contact us
What happens if I change this URI… oooooh
Halvor Sakshaug
-
Contact us
Defensive Coding Bootcamp
Heather Downing
-
Contact us
The Hand That Feeds - How to Misuse Kubernetes
Lewis Denham-Parry
-
Contact us
How we secure NAV.no and 1/3 of Norway's national budget
Hans Kristian Flaatten
-
Contact us
Building Secure Microservices in Azure
Jimmy Bogard
-
Contact us
Formal verification of C# smart contracts
Allister Beharry
-
Contact us
You Shall Not Password: Modern Authentication for Web Apps
Eli Holderness
-
Contact us
Vulnerability Exists Between Keyboard and Chair
Stephen Rees-Carter
-
Contact us
Forget about OAuth 2.0. Here comes OAuth 2.1
Philippe De Ryck
-
Contact us
OAuth – the good Parts
Anders Abel
-
Contact us
Lightning Talks
Iryna Zelenetska, Hallstein Brøtan, Einar Høst
-
Contact us
Sandboxing .NET assemblies for fun, profit and of course security!
Niels Tanis
-
Contact us
Securing your .NET application software supply-chain
Niels Tanis
-
Contact us
The state of passwordless auth on the web
Phil Nash
-
Contact us
JWT! What is it good for? Absolutely everything (almost)!
Ben Dechrai
-
Contact us
So long, Secure Coding
Laura Bell
-
Contact us
Cyber Broken
Scott Helme
-
Contact us
From Application Security to Developer Security – Shift left with GitHub Advanced Security
Michael Kaufmann
-
Contact us
How to steal Azure DevOps secrets
Björn Weström
-
Contact us
Part 1/2: How to use Microsoft's Graph API
George Coldham, Michelle Sandford
-
Contact us
NOPASSWD: Building a Passwordless Cloud Infrastructure
Kyle Kotowick
-
Contact us
Securing your .NET application software supply-chain, the practical approach!
Niels Tanis
-
Contact us
Developing Flexible Authorisation Capabilities in ASP.NET Core
Jason Taylor
-
Contact us
Getting API security right
Philippe De Ryck
-
Contact us
Defensive Coding Bootcamp
Heather Downing
-
Contact us
Return Oriented Programming, an introduction
Patricia Aas
-
Contact us
Hyper Speed! When Big Data Blooms
Scott Helme
-
Contact us
Secure Coding in C and C++
Robert Seacord
-
Contact us
Defending Kubernetes Environments: A Hands-On Approach
Jimmy Mesta
-
Contact us
What the Premier League can teach us about Zero Trust Security
Michal Davidson
-
Contact us
Stories from DART: Taking the ware out of ransomware
Sarah Young, Jennifer Elliott
-
Contact us
(In)Secure C++: Sec Edition
Patricia Aas
-
Contact us
Part 2/2: How to use Microsoft's Graph API
Michelle Sandford, George Coldham
-
Contact us
High Security OAuth
Dominick Baier, Brock Allen
-
Contact us
Secure Programming for the Enterprise in .NET, .NET Core and Future
Stephen Haunts
-
Contact us
GitHub + Azure: Better Together!
April Edwards
-
Contact us
A builder’s guide to Single Page Application security
Philippe De Ryck
-
Contact us
Workshop: Securing (and Observing) Kubernetes clusters with Cilium and eBPF - Part 2/2
Hans Kristian Flaatten, Øyvind Randa
-
Contact us
Building Secure API's and Web Applications
Philippe De Ryck
-
Contact us
The Hows and Whys of Running Our Own OpenidConnect Identity Provider
Roland Guijt
-
Contact us
TLS/HTTPS Security for Web Developers
Scott Helme
-
Contact us
How AI is impacting cybersecurity. Does it?
Victoria Almazova
-
Contact us
Keynote: Crypto means Cryptography!
Scott Helme
-
Contact us
Build your own application security program
Laura Bell
-
Contact us
A Builder's Guide to Securing Modern Applications
Philippe De Ryck
-
Contact us
Identity & Access Control for modern Applications and APIs using ASP.NET Core 7
Brock Allen, Joe DeCock
-
Contact us
Hyper Speed! When Big Data Blooms
Scott Helme
-
Contact us
Building Secure API's and Web Applications
Jim Manico
-
Contact us
Secure Programming for the Enterprise in .NET Framework / .NET Core
Stephen Haunts
-
Contact us
OAuth, OpenID Connect & .NET – the Good Parts
Dominick Baier
-
Contact us
Secure Coding in C and C++
Robert Seacord
-
Contact us
API security for developers
Philippe De Ryck
-
Contact us
OAuth in 2021 – What’s up?
Dominick Baier
-
Contact us
Secure Programming for the Enterprise in .NET and .NET Core
Stephen Haunts
-
Contact us
Advanced Security Design: Threat Modeling Masterclass
Avi Douglen
-
Contact us
Getting API security right
Philippe De Ryck
-
Contact us
(In)Security in C++
Patricia Aas
-
Contact us
Workshop: Securing (and Observing) Kubernetes clusters with Cilium and eBPF - Part 1/2
Hans Kristian Flaatten, Øyvind Randa
-
Contact us
Keynote: Unicorn Hunting
Mikko Hypponen
-
Contact us
Threat Assessment for Software Architects
Erica Anderson, Laura Bell
-
Contact us
The OWASP Top Ten for Developers
Jim Manico
-
Contact us
Building Scalable and Maintainable APIs with ASP.NET Core Workshop
Spencer Schneidenbach
-
Contact us
Batten Down the Hatches! A Cluster Security Journey
Jimmy Mesta, Steve Wade
-
Contact us
Creating a hybrid and multi-cloud strategy using Azure API Management
Eldert Grootenboer
-
Contact us
TBA - Troy Hunt
Troy Hunt
-
Contact us
Linux Security and Isolation APIs Fundamentals
Michael Kerrisk
-
Contact us
NDC Conferences uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it