Software Composition Analysis
Scope of Penetration Testing, Attack Modeling
Static Analysis
Security Research
WebApp Fuzzing, Mobile Testing, Secrets Management
Building a Security Program
Security Economy, Password Resets, Vendor Consolidation
Dependency Management
State of Australian AppSec, Evolving Software Security Supply Chain
Engaging Developers, ALBeast, Dangerous TLDs
In-Person vs. Virtual Training, Compliance Violations
Token Security, Staying Technical as a Manager