Sched.com Conference Mobile Apps
OWASP Global AppSec EU 2026 Vienna
OWASP Global AppSec EU 2026 Vienna
Sign up
or
log in
to add sessions to your schedule and sync them to your phone or calendar.
About
Schedule
Venue Map
Search
Menu
About
Schedule
Venue Map
Search
Share your event
Share via
or Copy link
Copy
Event Schedule
My Schedule
0
View
Simple
Expanded
Grid
By Venue
View
Simple
Expanded
Grid
By Venue
arrow_back
View All Dates
Thursday
, June 25
Expo Hall X1
8:30am •
Coffee/tea
12:15pm •
Lunch in Expo Hall
3:00pm •
PM Break in Expo Hall
4:15pm •
Networking Reception in Expo Hall and OWASP Jeopardy!
Hall D (Level -2)
9:00am •
Opening Remarks
9:15am •
Keynote: The Reinvention of Software Engineering
10:30am •
AI Explainability Score Card
11:30am •
Authorization Is Where Your App Goes to Lie
1:15pm •
The Map of Artificial Treasures: What to Automate in Security - and Why?
2:15pm •
Human Rights Threat Modeling
3:30pm •
AI and the Threat Modeling Manifesto: Conflicts, Failure Modes, and Better Patterns
Hall G1 (Level -2)
10:30am •
Builders & Breakers Part II: Securing Agentic AI After the Death of LLM Wrappers
11:30am •
The OWASP Top Ten 2025
1:15pm •
Retiring CVE Chasing: Defending Against Application Exploit Techniques
2:15pm •
Beyond the Chatbox: Implementing Guardrails for Autonomous Agents and LLMs Using Tools
3:30pm •
The Devil is in the Defaults - what to do about XSS
Hall G2 (Level -2)
10:30am •
Scanning Agentic AI Systems: Beyond Traditional LLM Red Teaming
11:30am •
Developing Effective Security Testing Skills with Objective Structured Assessments
2:15pm •
This Build can Break You - Evil Runners and eBPF for Detection
3:30pm •
Boiling the Ocean for Signal: Lessons from High-Volume OSS Malware Detection
Hall K1 (Level -2)
10:30am •
Why Isn't the Fix in My Container? Tracking CVE Propagation Across 10,000 Projects
11:30am •
Actionable Continuous SBOM Diffing
1:15pm •
One IDE to Rule Them All - Securing Your Supply Chain’s Weakest Link
2:15pm •
From 0 to SLSA Level 3: A Practitioner's Field Guide
3:30pm •
Pragmatic least-privilege for cloud and Kubernetes: applying good advice to real systems
Hall K2 (Level -2)
10:30am •
Why AppSec Fails at Scale (and How to Fix It)
11:30am •
Admission of Guilt: I Exploited a Parking System for a Year (And What It Taught Me About AppSec)
1:15pm •
The Velocity Paradox: Why Slow is Smooth and Smooth is Fast in AppSec
2:15pm •
Taming the AppSec Data Deluge
3:30pm •
Agile Development and IT Security – From Conflict to Collaboration
Room -2.15 (Level -2)
1:30pm •
Private Board Meeting
3:15pm •
OWASP Leaders Meeting
Room -2.33 (Level -2)
10:30am •
OWASP masCon - Introduction by OWASP MAS team to MAS Con
10:35am •
OWASP masCon - Let's get frooky: Structured Mobile DAST with Frida
11:30am •
OWASP masCon - Unveiling The Internals From Multiplatform Mobile Runtimes
1:15pm •
OWASP masCon - Recent Mobile App Security Incidents from Real-World Cases
Room -2.82 (Level 2)
10:30am •
OpenCRE.org: Uniting all standards and guidelines
11:00am •
OWASP AI Testing Guide in Practice: Securing LLM Applications
11:30am •
OWASP AI Security Verification Standard (AISVS)
1:15pm •
OWASP ModSecurity
1:45pm •
OWASP KubeFIM: Detecting File Integrity Threats with eBPF & AI in Kubernetes
2:15pm •
Evil User Stories Modeling: Ensuring your User Stories in agile playing OWASP Cornucopia
2:45pm •
OWASP MCP Top 10: When AI Agents Go Rogue, Securing the Model Context Protocol
3:30pm •
OWASP AI Exchange Showcase
Room -2.92 (Level -2)
10:05am •
Hands-On: Building Security Guardrails for AI-Generated Code
10:05am •
Teaching Security Concepts Using Physical Analogies
10:05am •
The Old But Unforgettable Key
12:15pm •
“2001: Agentic Odyssey” When threat modelling meets HAL, agentic AI, testing and safety engineering
12:15pm •
Hunting Critical CVEs: A Hands-On, Pick-Your-Own Exploitation POD
12:15pm •
Cybersecurity Awareness Card Game : Let's Play
2:30pm •
From Prompts to Payloads: Exploiting the AI-AppSec Intersection
2:30pm •
DDoS your friends
2:30pm •
AI for Code Security in Modern Codebases
2:30pm •
Context & Cringe - Application Privacy through Play
Terrace G of Austria Center
7:45am •
Women in AppSec Breakfast (Sign up Required)
Filter By Date
Jun 22
-
26, 2026
Monday
, June 22
Tuesday
, June 23
Wednesday
, June 24
Thursday
, June 25
Friday
, June 26
Filter By Venue
Vienna, Austria
All
Expo Hall X1
Foyer D (Level -2)
Hall D (Level -2)
Hall G1 (Level -2)
Hall G2 (Level -2)
Hall K1 (Level -2)
Hall K2 (Level -2)
Room -2.11 (Level -2)
Room -2.15 (Level -2)
Room -2.33 (Level -2)
Room -2.82 (Level 2)
Room -2.92 (Level -2)
TBA
Terrace G of Austria Center
Filter By Type
1-Day Training
2-Day Training
3-Day Training
Bonus Track
Deployment and Maintenance
Implementation
Keynote
Meals Provided by OWASP
Meeting
MobileAppSecCon
Planning and Design
PODS (Hands-on Activities)
Process and Culture
Project Demo Lab (Hands-on)
Project Showcase (Lightning Talks)
Project User Day
Sponsored Happy Hour
Testing
Audience
Advanced
All
AppSec Engineers
Beginner
Developers
Intermediate
Introductory and Overview
Private Meeting
Security Champions
Students and newcomers in AppSec
Subject
AI
CRA
Dependancies
DevSecOps
Gamification
Kubernetes
Mobile Security
Network Security
Pentesting
SBOM
SSDLC
Standards
Threat Modeling
WAF
Share Modal
Share this link via
Or copy link
Copy
Filter sessions
Apply filters to sessions.
Filtered by
Date
-
Clear filter
close
Dates
Monday
, June 22
Tuesday
, June 23
Wednesday
, June 24
Thursday
, June 25
Friday
, June 26
Session Type
1-Day Training
2-Day Training
3-Day Training
Bonus Track
Deployment and Maintenance
Implementation
Keynote
Meals Provided by OWASP
Meeting
MobileAppSecCon
Planning and Design
PODS (Hands-on Activities)
Process and Culture
Project Demo Lab (Hands-on)
Project Showcase (Lightning Talks)
Project User Day
Sponsored Happy Hour
Testing
Other Filters
Audience
Advanced
All
AppSec Engineers
Beginner
Developers
Intermediate
Introductory and Overview
Private Meeting
Security Champions
Students and newcomers in AppSec
Subject
AI
CRA
Dependancies
DevSecOps
Gamification
Kubernetes
Mobile Security
Network Security
Pentesting
SBOM
SSDLC
Standards
Threat Modeling
WAF