OWASP Netherlands
The Dawn Of The Emerging Tech Hero - Tiago Teles
AI: The New Beginning? A Lighthearted Talk About Our End Of Days - Rob Van Der Veer
How The EU Cyber Resilience Act Will Change The Software Industry Forever - Olle E. Johansson
Supercharging OAuth 2.0 Security - Philippe De Ryck
How To Use OWASP Security Champions Guide - Irfaan Santoe & Robin Van Loon
From Code To Cloud: Securing The Stack With Open-Source Tools - Mackenzie Jackson
A Novel Way To Integrate Security Through AI In Software Design - Spandan Chandra
OWASP NL Chapter Meeting 15 February 2024
Far From Green Fields - Introducing Threat Modelling To Established Teams - Sarah-Jane Madden
A Quest To Tame DevOps Unicorns - Jeroen Prinse
How To Implement With DevSecOps In Large Complex Organizations - Stefan Simenon
Everything-as-Code: Pushing The Boundaries Of SAST - Frans Van Buul
The State Of The Art In AI Security - Rob Van Der Veer
OWASP Juice Shop - An Open Source Software (And Security) Fairytale - Björn Kimminich
Down The Rabbit Hole: Exploring GraphQL Exploitation - Himanshu Mehta
Secure Defaults: A Scalable Security Approach For Modern Development - Pieter De Cremer
Using WebAssembly To Run, Extend, And Secure Your Application - Niels Tanis
Unveiling The Secrets In Your Code: Detecting And Triaging Exposed Credentials At Scale - Ingmar Vis
Hacking CI/CD Pipelines: Some Use Cases For Hacking CI/CD Orchestrators - Mauricio Cano
About Containers And Their Escapes: Understanding Escape Patterns And Possibilities - Mauricio Cano
SAST, DAST, IAST... xAST De-mystified - Martin Knobloch
DAST In The World Of DevSecOps - Amit Sharma
AppSec In IT Contracts - Sebastian Avarvarei
@OWASPNetherlands , @isacanlchapter5256 , and @dutchchapterofisc6216: Web Application Firewalls
OWASP Juice Shop by Björn Kimminich
The Rise Of The Security Verification Standard by Josh Grossman
Crash Course On The OWASP API Security Top 10 by Colin Domoney
When hackers and cats help - Redesigning security during a crisis by Brenno de Winter
Are your APIs rugged? by Colin Domoney
Assessing the state of practice of threat modeling in Dutch organizations by Koen Yskout