You're currently viewing an offline version of the schedule, so it may be outdated. Refresh this page once you have an internet connection to see the current schedule.
Web Application Firewall bypass techniques Workshop (Bohdan Lukin)
Subdomain discovering as an essential part of the reconnaissance phase (Kostiantyn Sanduliak)
Introduction lstio Service Mesh (Stanislav Kolenkin)
OWASP Top-10 A2: Broken Authentication (Svyat Login)
Email as an initial attack vector (Artur Hil)
Building SQL firewall: insights from developers (Artem Storozhuk)
Application Threat Modeling (Vlad Styran)