Open Security Summit
Open Security Summit
Join us for this unique event where you will connect, learn and collaborate. Not just your usual conference with plenaries and a single stream, the Open Security Summit takes you away from your everyday work and immerses you in Working Sessions to collaborate and come up with deliverables, and User Sessions to upskill and get hands-on experience, as well as plenty of opportunities to network with some of the most skilled professionals in this field.
Combatting Adversarial AI: The Role of CISOs, CTOs, Top Management in Defending Against AI Attacks
Using GenAI to Create Personalized Cybersecurity News Feeds
AI and AppSec: are we finally on the verge of the big breakthrough?
Improving DevOps using GenAI: Understanding, Visualizing, and Optimizing
Taking Responsibility for your Software - How to Simply Monitor Solutions for Known Vulnerabiities
Regulatory Developments in Cybersecurity
Hacking OAuth: An Attacker's View of Your OAuth Flows
Threat Modeling Kata VI
Can we trust AI with our Cyber Defences?
Use GenAI to Understand and Transform Content, Not to Create It
Stories of Female Empowerment in Cyber Security
Defense in Depth Layers: Practical Security for LLMs on Google Cloud
Using GenAI to scale CISO's Reporting Workflows
Практический семинар: использование приложения OWASP DSOMM для разработки и реализации собственно...
Advanced Persistent Threat (APT) Mapping and Mitigation
Deterministic GenAI Outputs with Provenance
Improving Mental Health & Security Outcomes Through Flow States
Threat Modeling the LLM Pipeline
Azure OpenAI Service Demo 4
What is the Open Security Summit and How to Be Part of It?
Symantec Threat Modeling
LangChain and the Future of OpenAI
What's an AI System and How it is Different to an AI Model?
eBPF in the Linux Kernel
Machine Learning: Confusion and Hallucinations
Can Bing Outpace Google?
Securing CI/CD Runners Through eBPF Agent
Who Goes There? Actively Detecting Intruders With Cyber Deception Tools
Technics to limit hallucinations when using a LLM solution like ChatGPT
Threat Modeling Kata IV