Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Getting started with Source Code Reviews | IdentityShield '26

Secure coding starts with deeply understanding code and vulnerabilities, and secure code reviews are crucial in finding issues early. In this hands-on secure code review workshop, we will teach the participants how to perform effective code reviews with both manual and automated techniques. Speaker: Prateek Thakare Senior Security Engineer, GoDaddy Bengaluru, India& Gaurav Bhosale Senior Application Security Engineer | Ex-10xbanking, Mastercard, Payatu Indore, India.

Your API Is the New Titanic (Iceberg Already Here) #apisecurity #cybersecurity #riskmanagement #api

The Titanic didn't hit the iceberg by accident. Organizations hit the API security iceberg for the same reason: they didn't see it coming. Your API iceberg consists of: Public APIs — for customers (SaaS, partners, third-parties) Private APIs — internal infrastructure (larger companies = larger insider threat surface) Partner APIs — for ecosystem integration AI APIs — the new frontier (and the most dangerous)

Fiat Frustration, Bitcoin Savings And Ether Payments

The discussion attacks fiat currency and argues for open digital money that works across borders without bank packages and profit driven fees. Bitcoin appears as long term store of value, with faster networks such as Ether handling daily transactions and travel friendly payments in a more consistent way.

1Password presents: Phishing prevention

AI-powered scams are making phishing attacks harder to spot than ever. In this demo, see how 1Password’s phishing prevention feature helps stop users before they share credentials with fraudulent websites. When a site’s URL doesn’t match a saved login, 1Password won’t autofill. Now, when a user tries to paste their credentials anyway, a warning prompts them to pause and take a closer look. This added layer of protection acts as a second pair of eyes at the moment it matters most.

Breaking Silos with SCDR: How SOCs & TPRM Teams Drive Integrated Cyber Strategies

Too often, vendor risk management operates in a silo, focused on compliance checkboxes, while the SOC team is on the frontlines of threat intelligence and response. These two groups should be allies, but instead, they’re often working in isolation. That’s a problem because cyber risk isn’t just a compliance issue… it’s a threat issue. Join Steve Cobb for this talk on: SecurityScorecard monitors and scores over 12 million companies worldwide.

Agentic SecOps Workspace demo: AI agents operating inside LimaCharlie

LimaCharlie CEO/Founder, Maxime Lamothe-Brassard, walks through LimaCharlie's Agentic SecOps Workspace in this demo, showing how AI agents can directly operate security infrastructure using the platform's complete API coverage. What you'll see.