&

Special Feature

FEATURED TRACKS: Application, API and Runtime Security

DATE
TIME
TOPIC
   
JAN
   
TBD
   

Shifting Left: Integrating Security Early in the SDLC

   
JAN
   
TBD
   

Securing Open Source Dependencies in Modern Applications

   
JUL
       

The Risks of Generative AI in Application Security Testing

AI Session
   
JAN
   
TBD
   

The Role of Secure Coding Standards in Reducing Vulnerabilities

   
JAN
   
TBD
   

Managing Secrets and Credentials in Application Development

   
JAN
   
TBD
   

Threat Modeling for Modern Application Architectures

   
JUL
       

Adversarial Attacks on AI-Powered Applications: What to Watch For

AI Session
   
JAN
   
TBD
   

The Human Factor: Developer Training and Security Awareness

   
JAN
   
TBD
   

Application Security Testing: SAST, DAST, and Beyond

   
JAN
   
TBD
   

Zero Trust Principles for Application Security

   
JAN
   
TBD
   

Securing Mobile and Web Applications: Unique Challenges and Solutions

   
JUL
       

Leveraging AI for Mobile App Threat Detection and Fraud Prevention

AI Session
   
JAN
   
TBD
   

Securing Mobile Apps: Addressing Platform-Specific Threats (iOS & Android)

   
JAN
   
TBD
   

Mobile App Data Protection: Encryption, Privacy, and Secure Communication

   
JAN
   
TBD
   

Securing APIs in Microservices and Cloud-Native Environments

   
JAN
   
TBD
   

API Authentication and Authorization: Best Practices

   
JUL
       

Securing AI/ML APIs: Protecting Models and Data

AI Session
   
JAN
   
TBD
   

OWASP API Security Top 10: Real-World Lessons Learned

   
JAN
   
TBD
   

API Rate Limiting, Throttling, and Abuse Prevention

   
JAN
   
TBD
   

Managing and Securing Public, Private, and Partner APIs

   
JUL
       

AI-Driven Anomaly Detection for API Abuse and Fraud

AI Session
   
JAN
   
TBD
   

API Versioning and Deprecation: Security Implications

   
JAN
   
TBD
   

Incident Response for API Breaches: Preparation and Execution

   
JAN
   
TBD
   

Protecting Applications in Production: Runtime Threat Detection

   
JUL
       

AI-Powered Threat Detection in Runtime Environments

AI Session
   
JAN
   
TBD
   

Securing Containers and Orchestrators (e.g., Kubernetes)

   
JAN
   
TBD
   

Runtime Monitoring and Logging: Detecting Anomalies in Real-Time

   
JAN
   
TBD
   

Bridging the Gap: Integrating Runtime Security with CI/CD Pipelines

   
JUL
       

Using AI for Automated Vulnerability Discovery at Runtime

AI Session
   
JAN
   
TBD
   

Legacy Application and Runtime Security: Modernizing Safely

   
JAN
   
TBD
   

Policy Enforcement and Segmentation at Runtime

   
JUL
       

Balancing Innovation and Security: AI Regulations and Compliance for Modern Apps, APIs, and Runtime

AI Session