42:05 Safety vs Security: How to Create Insecure Safety-Critical System • Alexander Timorin • GOTO 2016 GOTO Conferences
30:15 Privacy-First Research with OpenSAFELY • Eli Holderness & Hannes Lowette • GOTO 2025 GOTO Conferences
9:38 Disturbing Cyber-Security Attacks on Software Supply-Chains • Dave Farley • GOTO 2025 GOTO Conferences
34:37 Encrypted Computation: What if Decryption Wasn’t Needed? • Katharine Jarmul • GOTO 2024 GOTO Conferences
42:53 Building Secure ReactJS Apps: Mastering Advanced Security Techniques • Jim Manico • GOTO 2024 GOTO Conferences
46:01 Cloud Native Application Protection Platforms (CNAPPs) • Russ Miles & James Lewis • GOTO 2025 GOTO Conferences
46:17 A Deep Dive into the Past, Present & Future of OAuth • Aaron Parecki • GOTO 2024 GOTO Conferences
41:43 GitHub Copilot & GitHub Advanced Security - A Quick Tour • Karl Krukow • GOTO 2024 GOTO Conferences
55:12 GitHub Advanced Security: Helping Developers Secure the World’s Software • Karl Krukow • GOTO 2023 GOTO Conferences
31:44 Mastering Web Security: Myths, Strategies & More! • Scott Helme & Sebastian Brandes • GOTO 2023 GOTO Conferences
4:13 Privacy, Crime, National Security, Human Rights & You in 4 Minutes • Bert Hubert • GOTO 2023 GOTO Conferences
45:15 Shifting from Syntax to Secure Software Development Processes • Laura Bell Main • YOW! 2023 GOTO Conferences
35:29 Why Security Initiatives Are Doomed to Fail & What You Can Do About It • Josh Armitage • YOW! 2023 GOTO Conferences
1:58 The One Where We Threat Model During Development in 2 Minutes • Izar Tarandach • GOTO 2023 GOTO Conferences
48:38 Crypto Heist: The Aftermath of a Government Website Cryptojacking Attack • Scott Helme • GOTO 2023 GOTO Conferences
43:49 Cryptocurrencies Are Traceable & What Is Cryptojacking? • Andy Greenberg & Scott Helme • GOTO 2023 GOTO Conferences
2:25 Beyond Passwords: How WebAuthn Actually Works in 2 Minutes • Eli Holderness • GOTO 2023 GOTO Conferences
7:04 Virtual Hacker Labs & Capture the Flag in 7 Minutes • Jens Myrup Pedersen • GOTO 2023 GOTO Conferences
26:58 Unlocking the Web: Exploring WebAuthn & Beyond • Eli Holderness & Mark Rendle • GOTO 2023 GOTO Conferences
40:45 Creating Local-First Collaboration Software with Automerge • Martin Kleppmann • GOTO 2023 GOTO Conferences
29:39 Crafting Robust Architectures for a Resilient Future • Eleanor Saitta & Jez Humble • GOTO 2023 GOTO Conferences
38:44 Competence Development Through Capture the Flag & Virtual Hacker Labs • Jens M. Pedersen • GOTO 2023 GOTO Conferences
42:01 Privacy, Crime, National Security, Human Rights & You in the Middle • Bert Hubert • GOTO 2023 GOTO Conferences
40:11 Has My IoT Device Been Hacked? Establishing Trust w/ Remote Attestation • Edlira Dushku • GOTO 2023 GOTO Conferences
38:57 The Java Agent: Modifying Bytecode at Runtime to Protect Against Log4J • Joe Beeton • GOTO 2022 GOTO Conferences
33:12 Hack Like a Pro: Bug Bounties, Web Vulnerabilities & More! • Ben @NahamSec & Julian Wood • GOTO 2022 GOTO Conferences
39:02 Using GraphDB Technology to Resolve Transitive Vulnerabilities at Scale • Emil Wareus • GOTO 2022 GOTO Conferences
40:50 What the Hack: A Personal Story about Ethical Hacking • Ben Sadeghipour @NahamSec • GOTO 2022 GOTO Conferences
13:26 The Current State of Cyber Security • Eleanor Saitta & Aino Vonge Corry • GOTO 2022 GOTO Conferences
45:38 AWS Cookbook: Recipes for Success on AWS • John Culkin, Mike Zazon & Kesha Williams • GOTO 2022 GOTO Conferences
13:09 Triaging Real Time Security Threats with eBPF Powered Observability • Daniel Kim • GOTO 2022 GOTO Conferences
25:56 ML Security Operations at One of the Largest Brewing Companies • Maurits van der Goes • GOTO 2022 GOTO Conferences
47:02 Restful Web API Patterns & Practices Cookbook • Mike Amundsen & Alianna Inzana • GOTO 2022 GOTO Conferences
51:19 Security Chaos Engineering • Kelly Shortridge, Aaron Rinehart & Mark Miller • GOTO 2022 GOTO Conferences
19:42 Bridging Cyber Security: Detectify • Rickard Carlsson & Jørn Larsen • GOTO 2022 GOTO Conferences
33:22 Serverless Security: New Risks Require New Approaches • Itay Rozenman • GOTO 2021 GOTO Conferences
31:35 Adapting DevOps in a World of Growing Software Supply Chain Attacks • Adam Such • GOTO 2021 GOTO Conferences
18:17 Security Chaos Engineering - Winning at Security “Whack-a-Mole” • Aaron Rinehart • GOTO 2021 GOTO Conferences
21:09 Security Chaos Engineering: From Theory to Practice • Jamie Dicken • GOTO 2021 GOTO Conferences
29:46 Risks in Systems Design: Chaos Engineering in Apps & Cloud Security • Crystal Hirschorn • GOTO 2021 GOTO Conferences
28:56 Technology’s Impact on Humankind and Where We’re Headed Next • Marco Gercke • GOTO 2019 GOTO Conferences
13:49 Are Your Secrets Encrypted at Rest and in Transit? (Q5) • Liz Rice • GOTO 2020 GOTO Conferences
6:28 Are You Keeping Hosts Up to Date with the Latest Security Releases? (Q4) • Liz Rice • GOTO 2020 GOTO Conferences
16:26 Advanced OAuth and Pitfalls Part 2/2 • Aaron Parecki & Eric Johnson • GOTO 2020 GOTO Conferences
13:17 Is All Executable Code Added to a Container Image at Build Time? (Q2) • Liz Rice • GOTO 2020 GOTO Conferences
14:17 Are Your Builds Running Separately from Your Production Cluster? (Q1) • Liz Rice • GOTO 2020 GOTO Conferences