38:40 Andreas Falk Building secure cloud native applications with spring boot and spring All Hacking Cons
45:59 Ikka Turunen A chain of trust How to implement a supply chain approach to build and All Hacking Cons
43:40 C Mainka, V Mladenov, T Wich Systematically Breaking and Fixing OpenID Connect All Hacking Cons
42:01 J Rose, R Sulatycki Grow up AppSec A case study of maturity models and metrics All Hacking Cons
45:08 Tony Uceda Velez Attack tree vignettes for Containers as a Service applications and All Hacking Cons
44:03 Matthias Rohr Practical Threat Modeling with Microsofts Threat Modeling Tool 2016 All Hacking Cons
48:48 A Brucker, S Dashevskyi, F Massacci Using Third Party Components for building a All Hacking Cons
40:28 Glen ten Cate OWASP Security Knowledge Framework Making the web secure by design All Hacking Cons
39:45 Johannes Dahse Static Code Analysis of Complex PHP Application Vulnerabilities All Hacking Cons
41:03 John Kozyrakis Everything You Need to Know About Certificate Pinning But Are Too All Hacking Cons
43:27 Daniel Kefer, Rene Reuter Addressing Security Requirements in Development Projects All Hacking Cons
44:12 Adam Muntner Open Source Approaches to Security for Applications and Services at Mo All Hacking Cons
33:01 Scott Davis Scanning with swagger Using the Open API specification to find first All Hacking Cons