Speakers
Speaker
Speakers
Speakers
SQL injection, XSS, CSRF, authentication bypass, SSRF, API vulnerabilities, and modern web application attacks.
Adversarial attacks, model extraction, prompt injection, LLM vulnerabilities, data poisoning, and AI system exploitation.
AWS/Azure/GCP misconfigurations, IAM exploitation, container escapes, serverless vulnerabilities, and cloud-native attacks.
Speakers
Speaker
Speakers
Speakers
SQL injection, XSS, CSRF, authentication bypass, SSRF, API vulnerabilities, and modern web application attacks.
Adversarial attacks, model extraction, prompt injection, LLM vulnerabilities, data poisoning, and AI system exploitation.
AWS/Azure/GCP misconfigurations, IAM exploitation, container escapes, serverless vulnerabilities, and cloud-native attacks.
Chief Guest Yet To be Decided
Speaker
Speaker
Speaker
How Agentic AI can help Cybersecurity professionals to be more efficient?
Speakers
Speaker
Speakers
Speaker
Speakers
Speaker
Speaker
Speaker
Speaker
Speaker
Automation in Cybersecurity
Speakers
Speaker
Speaker
Speaker
Speaker
Speaker
Speaker
Speaker
Speakers
Speaker
Speakers
Speakers
SQL injection, XSS, CSRF, authentication bypass, SSRF, API vulnerabilities, and modern web application attacks.
Adversarial attacks, model extraction, prompt injection, LLM vulnerabilities, data poisoning, and AI system exploitation.
AWS/Azure/GCP misconfigurations, IAM exploitation, container escapes, serverless vulnerabilities, and cloud-native attacks.
Speakers
Speaker
Speakers
Speakers
SQL injection, XSS, CSRF, authentication bypass, SSRF, API vulnerabilities, and modern web application attacks.
Adversarial attacks, model extraction, prompt injection, LLM vulnerabilities, data poisoning, and AI system exploitation.
AWS/Azure/GCP misconfigurations, IAM exploitation, container escapes, serverless vulnerabilities, and cloud-native attacks.
Chief Guest Yet To be Decided
Speaker
Speaker
Speaker
How Agentic AI can help Cybersecurity professionals to be more efficient?
Speakers
Speaker
Speakers
Speaker
Speakers
Speaker
Speaker
Speaker
Speaker
Speaker
Automation in Cybersecurity
Speakers
Speaker
Speaker
Speaker
Speaker
Speaker
Speaker
Speaker