From Data to Defense: How Machine Learning and Deep Learning are Revolutionizing Cyber Security Quickie - INTERMEDIATE LEVEL Rachid OUBOUHOU SQLI Morocco More
From Known Threat Detection to Unknown: Advanced Cybersecurity with Zero-Trust Tools-in-Action - ADVANCED LEVEL bahaeddine hilali Nucleon Security More
Hidden security features of the JVM - everything you didn’t know and more Conference - BEGINNER LEVEL Steve Poole Sonatype More
Know Your Ingredients: Security Starts With the Source Conference - BEGINNER LEVEL Stephen Chin JFrog More
OWASP Top Ten Security Vulnerabilities in Node.js Hands-on Lab - INTERMEDIATE LEVEL Marco Ippolito NearForm More
Preventing Security Vulnerabilities in a Web Application Conference - EXPERT LEVEL Alexius DIAKOGIANNIS European Investment Bank More
Secure your software supply chain from dependencies to deployment Conference - BEGINNER LEVEL Abdel Sghiouar Google More
Supply Chain Levels for Software Artifacts with Kyverno Quickie - INTERMEDIATE LEVEL MOUTAKI ANAS SQLI Morocco More
To the Left, to the Left: All your Security Shifted to the Left Hands-on Lab - INTERMEDIATE LEVEL Jamie Coleman Sonatype Steve Poole Sonatype More
[UPGRADED] you should not blindly trust your security scanners and here is why ! Conference - INTERMEDIATE LEVEL Rachid ZAROUALI sevensphere More