Chris
Hughes
CYBERSYMPOSIUMS
&
Shifting Left: Integrating Security Early in the SDLC
Securing Open Source Dependencies in Modern Applications
The Risks of Generative AI in Application Security Testing
The Role of Secure Coding Standards in Reducing Vulnerabilities
Managing Secrets and Credentials in Application Development
Threat Modeling for Modern Application Architectures
Adversarial Attacks on AI-Powered Applications: What to Watch For
The Human Factor: Developer Training and Security Awareness
Application Security Testing: SAST, DAST, and Beyond
Zero Trust Principles for Application Security
Securing Mobile and Web Applications: Unique Challenges and Solutions
Leveraging AI for Mobile App Threat Detection and Fraud Prevention
Securing Mobile Apps: Addressing Platform-Specific Threats (iOS & Android)
Mobile App Data Protection: Encryption, Privacy, and Secure Communication
Securing APIs in Microservices and Cloud-Native Environments
API Authentication and Authorization: Best Practices
Securing AI/ML APIs: Protecting Models and Data
OWASP API Security Top 10: Real-World Lessons Learned
API Rate Limiting, Throttling, and Abuse Prevention
Managing and Securing Public, Private, and Partner APIs
AI-Driven Anomaly Detection for API Abuse and Fraud
API Versioning and Deprecation: Security Implications
Incident Response for API Breaches: Preparation and Execution
Protecting Applications in Production: Runtime Threat Detection
AI-Powered Threat Detection in Runtime Environments
Securing Containers and Orchestrators (e.g., Kubernetes)
Runtime Monitoring and Logging: Detecting Anomalies in Real-Time
Bridging the Gap: Integrating Runtime Security with CI/CD Pipelines
Using AI for Automated Vulnerability Discovery at Runtime
Legacy Application and Runtime Security: Modernizing Safely
Policy Enforcement and Segmentation at Runtime
Balancing Innovation and Security: AI Regulations and Compliance for Modern Apps, APIs, and Runtime