41:36 Behind the Scenes Securing In House Execution of Unsafe Third Party Executables All Hacking Cons
48:33 Threat Model Every Story Practical Continuous Threat Modeling Work for Your Team All Hacking Cons