You are currently viewing an older schedule version. You can find the current version here.
You're currently viewing an offline version of the schedule, so it may be outdated. Refresh this page once you have an internet connection to see the current schedule.
Subdomain discovering as an essential part of the reconnaissance phase (Kostiantyn Sanduliak)
Introduction lstio Service Mesh (Stanislav Kolenkin)
OWASP Top-10 A2: Broken Authentication (Svyatoslav Login)
Email as an initial attack vector (Arthur Hil)
Building SQL firewall: insights from developers (Artem Storozhuk)
Application Threat Modeling (Vlad Styran)