57:06 Stable, Safer, Faster AKA How to Avoid K8s Misconfig with Automation Noaa Barki All Hacking Cons
54:25 Everything You Wanted to Know About Client side CSRF But Were Afraid to Ask Soheil Khodayari All Hacking Cons
57:37 Catching Transparent Phish Understanding and Detecting MITM Phishing Kits Nick Nikiforakis & Bri All Hacking Cons
45:14 OWASP WrongSecrets We Have a Secret for Everyone Jeroen Willemsen & Ben de Haan All Hacking Cons
1:00:08 Defending Against New Phishing Attacks that Abuse OAuth Authorization Flows Jenko Hwong All Hacking Cons
49:20 Exhibitor Mitigate Risks In Code Protect Your Software based Supply Chain Maor Kuriel All Hacking Cons
54:29 Exhibitor Benchmarking the Security of Your Software Supply Chain Eylam Milner & Mor Weinberger All Hacking Cons
50:13 Exhibitor Worrisome Web Vulnerability Trends in the Race to Innovation Nicholas Sciberras All Hacking Cons
58:30 Team of 30 million Reducing Software Vulnerability at a Global Scale Laura Bell All Hacking Cons
50:29 Keynote 15 years of OWASP Top 10 Has the Cloud Made a Difference Shira Shamban All Hacking Cons
47:46 Exhibitor How to Meet the New Mobile Application Security Imperative Oliver Williams All Hacking Cons
47:23 Web Developers, Beware of the Tarpits for SAST in Your Code Luca Compagna & Feras Al Kassar All Hacking Cons
49:13 Understanding the Complete Chain of Application Security Using openCRE org Spyros Gasteratos & Rob All Hacking Cons