You are currently viewing an older schedule version. You can find the current version here.
You're currently viewing an offline version of the schedule, so it may be outdated. Refresh this page once you have an internet connection to see the current schedule.
Application Threat Modeling (Vlad Styran)
Introduction lstio Service Mesh (Stanislav Kolenkin)
OWASP Top-10 A2: Broken Authentication (Svyatoslav Login)
Email as an initial attack vector (Arthur Hil)