37:47 Authentication as a Microservice Portable Customer Identity Management Brian Pontarelli All Hacking Cons
38:37 Defensible Application Security for the Artificial Intelligence Era Chenxi Wang All Hacking Cons
30:45 Chromebooks and network motes to enforce security posture from the device to the cloud Jon Debonis All Hacking Cons
32:20 Deserialization Vulnerability Remediation with Automated Gadget Chain Discovery Ian Haken All Hacking Cons
35:22 The Anatomy of a Secure Web Application in Java Using Spring Security and Apache Fortress All Hacking Cons
26:19 Prevent Business Logic Attacks using Dynamic Instrumentation Jean Baptiste Aviat All Hacking Cons