49:41 Building Your Application Security Data Hub The Imperative for Structured Vulnerability Informatio All Hacking Cons
45:23 OWASP A9 A Year Later Are you still using components with known vulnerabilities All Hacking Cons