{ } NDC Conferences
About us
Dark
Light
Course Calendar
Sort after topic
May 19
NDC Oslo 2025
19 - 23 May 2025
150
Speakers
45
Technologies
20
Workshops
160
Talks
Sept 8
NDC Copenhagen 2025
8 - 12 September 2025
100
Speakers
40
Technologies
100
Talks
10
Workshops
Sept 22
NDC TechTown 2025
22 - 25 September 2025
50
Speakers
15
Technologies
10
Workshops
60
Talks
Oct 13
Azure Dev Summit 2025
13 - 16 October 2025
Oct 20
NDC Porto 2025
20 - 24 October 2025
80
Speakers
40
Technologies
8
Workshops
90
Talks
Nov 11
NDC AI 2025
11 - 13 November 2025
Dec 1
AI Red Teaming in Practice
Gary Lopez
2 days
Manchester
-
On demand courses
Part 2: Securing Kubernetes: Practical Workflows and Tools for Enhanced Cluster Protection
Rabieh Fashwall
-
Contact us
Asymmetric Encryption: A Deep Dive
Eli Holderness
-
Contact us
What I learnt about automating security
George Coldham
-
Contact us
Defendable Products: How we try to improve security in our products
Ståle Pettersen
-
Contact us
OPA everywhere! Exploring new opportunities in policy evaluation
Anders Eknert
-
Contact us
A data driven approach to application security
Petter Kvalvaag, Kristian Reed
-
Contact us
How hacking works - Web Edition
Espen Sande-Larsen
-
Contact us
What happens if I change this URI… oooooh
Halvor Sakshaug
-
Contact us
Security as Code: A DevSecOps Approach
Joseph Katsioloudes
-
Contact us
Securely deploying Infrastructure as Code
Chris Ayers
-
Contact us
Developing secure software with GitHub
Laura Kokkarinen, Thomas Vochten
-
Contact us
Surprising ways to escalate privileges in Entra ID
Marius Solbakken Mellum
-
Contact us
Assessing NuGet Packages more easily with Security Scorecards
Niels Tanis
-
Contact us
AWS Security Reference Architecture: Visualize your security
Mohamed Wali
-
Contact us
Detecting Malicious Activity: Unveiling the Secrets of MS-SQL Logging
Tristan Bennett
-
Contact us
Sandboxing in Linux with zero lines of code
Ignat Korchagin
-
Contact us
Microsoft Security Copilot - your new best friend!
George Coldham
-
Contact us
Passwords are Dead, Long live Passkeys!
Stephen Rees-Carter
-
Contact us
Tune your Toolbox for Velocity and Value
Josh Grossman
-
Contact us
No Size Fits All: Empowering Engineers with Custom Application Security tests
Michal Kamensky
-
Contact us
Detect threats and misconfigurations in your GCP environment and operationalize on findings
Brian Jung
-
Contact us
Leveraging graph AI and GPUs to win the US Cyber Command AI challenge
Leo Meyerovich
-
Contact us
Part 1/2: Hands-on grand tour of GPU Graph AI for security event correlation
Leo Meyerovich, Alex Morrise
-
Contact us
Part 2/2: Hands-on grand tour of GPU Graph AI for security event correlation
Leo Meyerovich, Alex Morrise
-
Contact us
TPMs and the Linux Kernel: unlocking a better path to hardware security
Ignat Korchagin
-
Contact us
Spoofing Commands - Can You Trust Process Creation Logs?
Tristan Bennett
-
Contact us
Inside Google's Discovery and Remediation of a Critical CPU Vulnerability
Yousif Hussin
-
Contact us
Part 1: Securing Kubernetes: Practical Workflows and Tools for Enhanced Cluster Protection
Rabieh Fashwall
-
Contact us
War Stories From the SOC
David Lilja
-
Contact us
RAG Against the Machine
Brennan Lodge
-
Contact us
Container Security with Falco: A Quick Start Guide
Ayesha Kaleem
-
Contact us
Part 1: Stop Firefighting Vulnerabilities, Start Eliminating Bug Classes at Scale: A Hands-On Workshop
Javan Rasokat
-
Contact us
Building a High-Value AppSec Scanning Programme
Josh Grossman
-
Contact us
Part 2: Stop Firefighting Vulnerabilities, Start Eliminating Bug Classes at Scale: A Hands-On Workshop
Javan Rasokat
-
Contact us
NDC Conferences uses cookies to see how you use our website. We also have embeds from YouTube and Vimeo. How do you feel about that?
All good!
Don't want it