Loading…
Type: PODS (Hands-on Activities) clear filter
Thursday, June 25
 

10:05am CEST

Hands-On: Building Security Guardrails for AI-Generated Code
Thursday June 25, 2026 10:05am - 12:05pm CEST
AI-assisted development is now responsible for a significant and growing portion of production code. However, most AppSec programs still treat AI as an external input to be scanned after code is written, rather than as a system that can be guided to produce safer code up front.

In this Practical On-Demand session, participants will explore a secure-by-construction approach to AI coding using Cursor-style rules and hooks. The POD is structured around short, repeatable activities rather than a linear workshop.
Speakers
avatar for David Archer

David Archer

Solution Architect, Endor Labs

David is a long-time software practitioner who has spent the last two decades building, breaking, and fixing software across development, product, and consulting roles. After repeatedly seeing security treated as an afterthought in fast-moving teams, he shifted full-time into application... Read More →
Thursday June 25, 2026 10:05am - 12:05pm CEST
Room -2.92 (Level -2)

10:05am CEST

Teaching Security Concepts Using Physical Analogies
Thursday June 25, 2026 10:05am - 12:05pm CEST
Understanding security fundamentals doesn’t have to be dry or abstract. In this interactive CF‑Pod, you’ll explore the core principles of confidentiality, integrity, and availability through surprising physical demonstrations and simple “magic‑like” activities that make each concept intuitive and memorable.

Each station focuses on one security principle and offers a short, hands‑on challenge that transforms an abstract idea into something you can see, touch, and explain to others. You can drop in for 10–15 minutes, try an activity, and walk away with a clear, practical analogy you can use in real‑world conversations with teammates and stakeholders.

Whether you're new to security or looking for better ways to teach it, this session will give you fun, effective tools for communicating the foundations of secure systems.
Speakers
MD

Mariia Denysenko

Cybersecurity Governance & Training Professional in IT, AI, and OT

Mariia is a cybersecurity governance and compliance professional with experience spanning IT security, AI security, and OT security. She focuses on developing secure processes, enabling teams, and translating complex security requirements into clear, actionable guidance.

Her backg... Read More →
Thursday June 25, 2026 10:05am - 12:05pm CEST
Room -2.92 (Level -2)

10:05am CEST

The Old But Unforgettable Key
Thursday June 25, 2026 10:05am - 12:05pm CEST
Application security failures often stem from small, everyday oversights that quietly accumulate into serious risk. This Practical On-Demand (POD) activity lets participants explore how those issues surface in real applications by actively engaging with a deliberately vulnerable web app.

Attendees can drop in at any time and participate in a self-paced, Capture the Flag (CTF) style challenge centred on investigation, experimentation, and problem solving. Starting from a minimal application with limited guidance, participants uncover and connect security weaknesses to progressively increase their level of access.

The activity is designed to be accessible to all experience levels. Newcomers can engage with individual challenges and learn core AppSec concepts, while more experienced practitioners can pursue deeper exploration and more complex exploitation paths. All scenarios are inspired by issues commonly encountered in real world development environments.

Facilitators are present throughout the session to support participants, answer questions, and provide short, optional walkthroughs for those without laptops. The emphasis remains on doing, discovery, and practical takeaways, ensuring participants leave with a stronger intuition for identifying risk and concrete guidance they can apply in their own applications.
Speakers
avatar for Raul Cicos

Raul Cicos

Security Consultant, Intruder

Raul is an experienced information security professional specialising in offensive security. He brings deep expertise across the full penetration testing lifecycle, from reconnaissance and vulnerability analysis to exploitation and clear, actionable reporting. His work focuses on... Read More →
TS

Tom Steer

Security Consultant, Intruder

Tom is an experienced security professional focused on offensive security, conducting high-quality penetration tests and identifying vulnerabilities across systems and applications. In his free time, he designs and hosts Capture The Flag (CTF) challenges using them to deepen his skills... Read More →
Thursday June 25, 2026 10:05am - 12:05pm CEST
Room -2.92 (Level -2)

12:15pm CEST

Cybersecurity Awareness Card Game : Let's Play
Thursday June 25, 2026 12:15pm - 2:15pm CEST
Learn the foundations of cybersecurity through a card game.

Participate in a tabletop, technology-free “capture the flag” experience where players gain practical insights into protecting digital information, responding to cyberattacks, and understanding core concepts such as the Cyber Kill Chain and the NIST Cybersecurity Framework.

For less experienced practitioners, the game builds a strong foundational mindset to support their ongoing cybersecurity journey. For more experienced practitioners, it offers a fresh, engaging way to communicate and teach core cybersecurity concepts. This makes cybersecurity more accessible and approachable for others.
Speakers
avatar for Michael Novack

Michael Novack

Solution Architect, Aiceberg

Michael is a product-minded security architect who loves turning tangled AI risks into clear, practical solutions. As Solution Architect at Aiceberg, he helps enterprises bake AI explainability and real-time monitoring straight into their systems, transforming real customer insights... Read More →
Thursday June 25, 2026 12:15pm - 2:15pm CEST
Room -2.92 (Level -2)

12:15pm CEST

Hunting Critical CVEs: A Hands-On, Pick-Your-Own Exploitation POD
Thursday June 25, 2026 12:15pm - 2:15pm CEST
New CVEs are released constantly, but in practice most teams never go beyond reading the advisory or relying on automated scanning. This POD is designed to change that by giving participants time and platform to hunt and exploit real-world critical CVEs.

Participants will have access to 10 hands-on challenges, each based on a real high or critical severity CVE commonly found in modern applications. Each challenge runs within a limited time window and can be attempted independently of the others.

For each challenge, participants can click a Deploy Lab option to spin up a temporary target system. The deployed application/system contains a previously undisclosed CVE to the participant, and the task is to identify the vulnerability, understand its behavior, and exploit it to demonstrate impact.

There is no fixed order or linear walkthrough. Participants are free to choose which CVEs to attempt, how deep they want to go with each one, and how long they want to stay in the activity. Some CVEs will allow participants to become admin, some might give a reverse shell. Labs are provisioned on demand using infrastructure-as-code, allowing participants to work independently on each challenge.

Some participants may focus on understanding a single CVE and reproducing it reliably. Others may try to exploit multiple issues or explore alternate attack paths. Both approaches are expected and encouraged.

The emphasis of this POD is on building practical intuition: how to read advisories critically, identify vulnerable attack surfaces, validate exploitability, and understand real impact beyond severity scores. The activity is fully hands-on, informal, and designed so people can join and leave at any time without falling behind.
Speakers
avatar for Abhinav Mishra

Abhinav Mishra

Founder, Cyber Security Guy

Abhinav Mishra is a cyber security practitioner with over 14 years of hands-on experience in vulnerability research, offensive security, and application security testing. He has carried out 1,000+ security reviews and penetration tests across web, mobile, API, and cloud-based systems... Read More →
Thursday June 25, 2026 12:15pm - 2:15pm CEST
Room -2.92 (Level -2)

12:15pm CEST

“2001: Agentic Odyssey” When threat modelling meets HAL, agentic AI, testing and safety engineering
Thursday June 25, 2026 12:15pm - 2:15pm CEST
“2001: Agentic Odyssey” is a hands-on, drop-in POD where we threat model the HAL 9000 system from 2001: A Space Odyssey as if it were a modern agentic AI system (LLM + tools + permissions + side effects). I bring a HAL DFD, and together we mark trust boundaries and do classic “what can go wrong?” threat identification. Participants then split into small groups to build attack-tree branches and translate them into Fault Tree Analysis (FTA) using AND/OR logic and minimal cut sets, including lightweight probability estimates to prioritise the most likely failure chains. We finish by turning those failure paths into automation-ready test ideas (fault injection, invariants, evidence), and optionally drafting a structured HAL threat model for submission to the OWASP Threat Model Library. Designed so anyone can contribute in 10-15 minutes, while advanced participants can go deep on FTA and prioritisation. Every stage is split into a way to enable drop-ins at any time.
Speakers
avatar for Petra Vukmirovic

Petra Vukmirovic

Head of Information Security at Numan and Fractional Head of Product, Devarmor

Petra is a technology enthusiast, leader and public speaker. A former emergency medicine doctor and competitive volleyball athlete, she thrives in challenging environments and loves creating order from chaos. Initially pursuing a medical career, Petra's passion for technology led... Read More →
Thursday June 25, 2026 12:15pm - 2:15pm CEST
Room -2.92 (Level -2)

2:30pm CEST

AI for Code Security in Modern Codebases
Thursday June 25, 2026 2:30pm - 4:30pm CEST
Modern codebases are large, fast-moving, and increasingly AI-assisted, making traditional code security approaches hard to scale. This hands-on POD explores how AI can augment secure coding and code review workflows—without replacing human judgment.

Participants will actively work through realistic code security scenarios drawn from modern APIs, cloud-native services, and GenAI-enabled components. Using guided exercises and optional AI prompts, attendees will identify vulnerabilities, reason about exploitability, and prioritize fixes mapped to OWASP Top 10 risks (including broken access control, injection, insecure design, and supply chain issues).

This is not a talk or a tool demo. Participants will do the work themselves through short, practical challenges. Beginners can follow structured steps, while experienced AppSec practitioners can dive into advanced issues such as logic flaws, authorization bypasses, insecure AI integrations, prompt injection risks in code, and unsafe use of AI-generated code.

The POD is drop-in friendly: participants can engage for a few minutes or stay longer to tackle deeper challenges. All techniques are applicable to real-world development environments, with or without AI tools.
Speakers
avatar for Rajnish Sharma

Rajnish Sharma

CEO, Precogs AI

Rajnish Sharma is the CEO and Founder of precogs.ai and a seasoned technology and security leader with experience in secure development, AI, and risk‑focused workflows. Previously, he served as Head of Investment Technology & AI at Allianz Global Investors, where he led strategic... Read More →
Thursday June 25, 2026 2:30pm - 4:30pm CEST
Room -2.92 (Level -2)

2:30pm CEST

Context & Cringe - Application Privacy through Play
Thursday June 25, 2026 2:30pm - 4:30pm CEST
Privacy risks are rarely obvious when looking at data, features, or apps in isolation. They emerge through changing context and are impacted by user perception.

In this POD, participants play Context & Cringe, a discussion-driven card game where players build fictional app scenarios using real-world data and features, then judge how those designs feel from a user’s perspective.

Rather than focusing on compliance or checklists, this session helps participants develop intuition for privacy impact by actively creating, debating, and experiencing cringey design choices. The result is a hands-on, low-barrier way to surface privacy risks that are often missed in a traditional security analysis - and a non-adversarial way to introduce uncomfortable topics into team discussions.
Speakers
avatar for Avi Douglen

Avi Douglen

Software Security Consultant, Bounce Security
Avi Douglen is the founder and CEO at Bounce Security, a boutique consultancy specializing in software security, where he spends a lot of time with development teams of all sizes. He helps them integrate security methodologies and products into their development processes, and often... Read More →
avatar for Kim Wuyts

Kim Wuyts

Manager Cyber & Privacy, PwC Belgium

Dr. Kim Wuyts is a leading privacy engineer with over 15 years of experience in security and privacy. Before joining PwC Belgium as Manager Cyber & Privacy, Kim was a senior researcher at KU Leuven where she led the development and extension of LINDDUN, a popular privacy threat modeling... Read More →
Thursday June 25, 2026 2:30pm - 4:30pm CEST
Room -2.92 (Level -2)

2:30pm CEST

DDoS your friends
Thursday June 25, 2026 2:30pm - 4:30pm CEST
interactive DDoS competition - player on player!

Each round players chooses to be an attacker or defender, matches up with an opponent and configures their attack/defense. The attack traffic is run (speed run), scores are given based on attack traffic stopped vs let through, and legit traffic blocked.

Players gain points each round, and there is an ongoing scoreboard. Leading attacker and defender configs are published too, so defenders and attackers can adapt.

The game is played on a webapp so can be accessed via mobile or laptop.
Speakers
avatar for Alex Marks-Bluth

Alex Marks-Bluth

Security Researcher, Akamai AppSec

Alex leads teams combining data science and security research in web application security, building security products for Akamai customers.

He enjoys watching and playing cricket, and every year he tries to learn Rust, for at least 2 weeks.
  linkedin.com/in/alex-marks-bluth-06a81... Read More →
Thursday June 25, 2026 2:30pm - 4:30pm CEST
Room -2.92 (Level -2)

2:30pm CEST

From Prompts to Payloads: Exploiting the AI-AppSec Intersection
Thursday June 25, 2026 2:30pm - 4:30pm CEST
LLMs are no longer standalone chatbots—they're increasingly embedded directly into application logic, with access to databases, APIs, file systems, and internal services. This architectural shift means the most dangerous LLM exploits don't just manipulate the model; they use the model as an attack vector to reach traditional AppSec targets. Prompt injection becomes a path to SQL injection. Conversational manipulation enables SSRF. The AI agent becomes an unwitting insider threat.

In this hands-on POD, participants will experience this convergence firsthand through a purpose-built vulnerable web application with an integrated AI agent. Through independent challenges, attendees will discover how attackers chain LLM manipulation with classic web exploitation—and why securing AI-integrated applications requires understanding both domains.

Challenges are designed for drop-in participation and cover multiple difficulty levels:
- Beginner-friendly: Basic prompt manipulation and information disclosure
- Intermediate: Chaining AI misuse with traditional web exploitation
- Advanced: Multi-stage attacks combining indirect prompt injection with server-side vulnerabilities

Each challenge is self-contained (under 15 minutes) with clear objectives, hints available on request, and facilitators ready to guide participants. Whether you're new to AI security or a seasoned pentester curious about LLM attack vectors, you'll walk away with practical techniques applicable to real-world assessments.

Challenges are mapped to multiple OWASP frameworks: the OWASP Top 10 for LLM Applications (covering risks like LLM01: Prompt Injection, LLM07: Insecure Plugin Design), the OWASP API Security Top 10, and the classic OWASP Web Application Top 10, helping participants connect new AI risks to established security knowledge.

No prior AI/ML experience required. Just curiosity and a laptop with a modern browser. All challenges run in-browser against our cloud-hosted lab environment.
Speakers
avatar for Dan Lisichkin

Dan Lisichkin

AI Security Researcher
Dan Lisichkin is the Cyber Security Researcher for Pillar Security, focusing on AI security, adversarial threats, and securing AI based systems. With over five years of experience in the cybersecurity and IT space, Dan has extensive knowledge in areas including malware analysis, reverse... Read More →
avatar for Ziv Karliner

Ziv Karliner

CTO, Pillar Security

Ziv Karliner is the Co-Founder and CTO of Pillar Security, where he works on securing AI-powered applications and agent-based systems. With over a decade of experience in cybersecurity, Ziv has led research and engineering efforts across application security, cloud security, financial... Read More →
avatar for Eilon Cohen

Eilon Cohen

AI Security Researcher, Pillar Security
That kid who took apart all his toys to see how they worked.
Currently breaking (and fixing) things in Pillar Security lab. Education spans from Mechanical Engineering and Robotics to Computer science, but a self-made security researcher and practitioner. Ex-IBM as a security engineer, securing multiple complex cloud and IT environments, now... Read More →
avatar for Ariel Fogel

Ariel Fogel

Founding Engineer & Researcher, Pillar Security

Ariel Fogel is a founding engineer & researcher at Pillar Security, where he hardens AI applications against real-world attacks and compliance risks. Over the past decade, he has built production systems in Ruby, TypeScript, Python, and SQL, shipping everything from full-stack web... Read More →
Thursday June 25, 2026 2:30pm - 4:30pm CEST
Room -2.92 (Level -2)
 
Friday, June 26
 

10:05am CEST

Cybersecurity Awareness Card Game : Let's Play
Friday June 26, 2026 10:05am - 12:05pm CEST
Learn the foundations of cybersecurity through a card game.

Participate in a tabletop, technology-free “capture the flag” experience where players gain practical insights into protecting digital information, responding to cyberattacks, and understanding core concepts such as the Cyber Kill Chain and the NIST Cybersecurity Framework.

For less experienced practitioners, the game builds a strong foundational mindset to support their ongoing cybersecurity journey. For more experienced practitioners, it offers a fresh, engaging way to communicate and teach core cybersecurity concepts. This makes cybersecurity more accessible and approachable for others.
Speakers
avatar for Michael Novack

Michael Novack

Solution Architect, Aiceberg

Michael is a product-minded security architect who loves turning tangled AI risks into clear, practical solutions. As Solution Architect at Aiceberg, he helps enterprises bake AI explainability and real-time monitoring straight into their systems, transforming real customer insights... Read More →
Friday June 26, 2026 10:05am - 12:05pm CEST
Room -2.92 (Level -2)

10:05am CEST

DDoS your friends
Friday June 26, 2026 10:05am - 12:05pm CEST
interactive DDoS competition - player on player!

Each round players chooses to be an attacker or defender, matches up with an opponent and configures their attack/defense. The attack traffic is run (speed run), scores are given based on attack traffic stopped vs let through, and legit traffic blocked.

Players gain points each round, and there is an ongoing scoreboard. Leading attacker and defender configs are published too, so defenders and attackers can adapt.

The game is played on a webapp so can be accessed via mobile or laptop.
Speakers
avatar for Alex Marks-Bluth

Alex Marks-Bluth

Security Researcher, Akamai AppSec

Alex leads teams combining data science and security research in web application security, building security products for Akamai customers.

He enjoys watching and playing cricket, and every year he tries to learn Rust, for at least 2 weeks.
  linkedin.com/in/alex-marks-bluth-06a81... Read More →
Friday June 26, 2026 10:05am - 12:05pm CEST
Room -2.92 (Level -2)

10:05am CEST

From Prompts to Payloads: Exploiting the AI-AppSec Intersection
Friday June 26, 2026 10:05am - 12:05pm CEST
LLMs are no longer standalone chatbots—they're increasingly embedded directly into application logic, with access to databases, APIs, file systems, and internal services. This architectural shift means the most dangerous LLM exploits don't just manipulate the model; they use the model as an attack vector to reach traditional AppSec targets. Prompt injection becomes a path to SQL injection. Conversational manipulation enables SSRF. The AI agent becomes an unwitting insider threat.

In this hands-on POD, participants will experience this convergence firsthand through a purpose-built vulnerable web application with an integrated AI agent. Through independent challenges, attendees will discover how attackers chain LLM manipulation with classic web exploitation—and why securing AI-integrated applications requires understanding both domains.

Challenges are designed for drop-in participation and cover multiple difficulty levels:
- Beginner-friendly: Basic prompt manipulation and information disclosure
- Intermediate: Chaining AI misuse with traditional web exploitation
- Advanced: Multi-stage attacks combining indirect prompt injection with server-side vulnerabilities

Each challenge is self-contained (under 15 minutes) with clear objectives, hints available on request, and facilitators ready to guide participants. Whether you're new to AI security or a seasoned pentester curious about LLM attack vectors, you'll walk away with practical techniques applicable to real-world assessments.

Challenges are mapped to multiple OWASP frameworks: the OWASP Top 10 for LLM Applications (covering risks like LLM01: Prompt Injection, LLM07: Insecure Plugin Design), the OWASP API Security Top 10, and the classic OWASP Web Application Top 10, helping participants connect new AI risks to established security knowledge.

No prior AI/ML experience required. Just curiosity and a laptop with a modern browser. All challenges run in-browser against our cloud-hosted lab environment.
Speakers
avatar for Eilon Cohen

Eilon Cohen

AI Security Researcher, Pillar Security
That kid who took apart all his toys to see how they worked.
Currently breaking (and fixing) things in Pillar Security lab. Education spans from Mechanical Engineering and Robotics to Computer science, but a self-made security researcher and practitioner. Ex-IBM as a security engineer, securing multiple complex cloud and IT environments, now... Read More →
avatar for Ariel Fogel

Ariel Fogel

Founding Engineer & Researcher, Pillar Security

Ariel Fogel is a founding engineer & researcher at Pillar Security, where he hardens AI applications against real-world attacks and compliance risks. Over the past decade, he has built production systems in Ruby, TypeScript, Python, and SQL, shipping everything from full-stack web... Read More →
avatar for Ziv Karliner

Ziv Karliner

CTO, Pillar Security

Ziv Karliner is the Co-Founder and CTO of Pillar Security, where he works on securing AI-powered applications and agent-based systems. With over a decade of experience in cybersecurity, Ziv has led research and engineering efforts across application security, cloud security, financial... Read More →
avatar for Dan Lisichkin

Dan Lisichkin

AI Security Researcher
Dan Lisichkin is the Cyber Security Researcher for Pillar Security, focusing on AI security, adversarial threats, and securing AI based systems. With over five years of experience in the cybersecurity and IT space, Dan has extensive knowledge in areas including malware analysis, reverse... Read More →
Friday June 26, 2026 10:05am - 12:05pm CEST
Room -2.92 (Level -2)

10:05am CEST

Hunting Critical CVEs: A Hands-On, Pick-Your-Own Exploitation POD
Friday June 26, 2026 10:05am - 12:05pm CEST
New CVEs are released constantly, but in practice most teams never go beyond reading the advisory or relying on automated scanning. This POD is designed to change that by giving participants time and platform to hunt and exploit real-world critical CVEs.

Participants will have access to 10 hands-on challenges, each based on a real high or critical severity CVE commonly found in modern applications. Each challenge runs within a limited time window and can be attempted independently of the others.

For each challenge, participants can click a Deploy Lab option to spin up a temporary target system. The deployed application/system contains a previously undisclosed CVE to the participant, and the task is to identify the vulnerability, understand its behavior, and exploit it to demonstrate impact.

There is no fixed order or linear walkthrough. Participants are free to choose which CVEs to attempt, how deep they want to go with each one, and how long they want to stay in the activity. Some CVEs will allow participants to become admin, some might give a reverse shell. Labs are provisioned on demand using infrastructure-as-code, allowing participants to work independently on each challenge.

Some participants may focus on understanding a single CVE and reproducing it reliably. Others may try to exploit multiple issues or explore alternate attack paths. Both approaches are expected and encouraged.

The emphasis of this POD is on building practical intuition: how to read advisories critically, identify vulnerable attack surfaces, validate exploitability, and understand real impact beyond severity scores. The activity is fully hands-on, informal, and designed so people can join and leave at any time without falling behind.
Speakers
avatar for Abhinav Mishra

Abhinav Mishra

Founder, Cyber Security Guy

Abhinav Mishra is a cyber security practitioner with over 14 years of hands-on experience in vulnerability research, offensive security, and application security testing. He has carried out 1,000+ security reviews and penetration tests across web, mobile, API, and cloud-based systems... Read More →
Friday June 26, 2026 10:05am - 12:05pm CEST
Room -2.92 (Level -2)

12:15pm CEST

AI for Code Security in Modern Codebases
Friday June 26, 2026 12:15pm - 2:15pm CEST
Modern codebases are large, fast-moving, and increasingly AI-assisted, making traditional code security approaches hard to scale. This hands-on POD explores how AI can augment secure coding and code review workflows—without replacing human judgment.

Participants will actively work through realistic code security scenarios drawn from modern APIs, cloud-native services, and GenAI-enabled components. Using guided exercises and optional AI prompts, attendees will identify vulnerabilities, reason about exploitability, and prioritize fixes mapped to OWASP Top 10 risks (including broken access control, injection, insecure design, and supply chain issues).

This is not a talk or a tool demo. Participants will do the work themselves through short, practical challenges. Beginners can follow structured steps, while experienced AppSec practitioners can dive into advanced issues such as logic flaws, authorization bypasses, insecure AI integrations, prompt injection risks in code, and unsafe use of AI-generated code.

The POD is drop-in friendly: participants can engage for a few minutes or stay longer to tackle deeper challenges. All techniques are applicable to real-world development environments, with or without AI tools.
Speakers
avatar for Rajnish Sharma

Rajnish Sharma

CEO, Precogs AI

Rajnish Sharma is the CEO and Founder of precogs.ai and a seasoned technology and security leader with experience in secure development, AI, and risk‑focused workflows. Previously, he served as Head of Investment Technology & AI at Allianz Global Investors, where he led strategic... Read More →
Friday June 26, 2026 12:15pm - 2:15pm CEST
Room -2.92 (Level -2)

12:15pm CEST

Context & Cringe - Application Privacy through Play
Friday June 26, 2026 12:15pm - 2:15pm CEST
Privacy risks are rarely obvious when looking at data, features, or apps in isolation. They emerge through changing context and are impacted by user perception.

In this POD, participants play Context & Cringe, a discussion-driven card game where players build fictional app scenarios using real-world data and features, then judge how those designs feel from a user’s perspective.

Rather than focusing on compliance or checklists, this session helps participants develop intuition for privacy impact by actively creating, debating, and experiencing cringey design choices. The result is a hands-on, low-barrier way to surface privacy risks that are often missed in a traditional security analysis - and a non-adversarial way to introduce uncomfortable topics into team discussions.
Speakers
avatar for Kim Wuyts

Kim Wuyts

Manager Cyber & Privacy, PwC Belgium

Dr. Kim Wuyts is a leading privacy engineer with over 15 years of experience in security and privacy. Before joining PwC Belgium as Manager Cyber & Privacy, Kim was a senior researcher at KU Leuven where she led the development and extension of LINDDUN, a popular privacy threat modeling... Read More →
avatar for Avi Douglen

Avi Douglen

Software Security Consultant, Bounce Security
Avi Douglen is the founder and CEO at Bounce Security, a boutique consultancy specializing in software security, where he spends a lot of time with development teams of all sizes. He helps them integrate security methodologies and products into their development processes, and often... Read More →
Friday June 26, 2026 12:15pm - 2:15pm CEST
Room -2.92 (Level -2)

12:15pm CEST

OWASP JuiceShop: Come and pwn me
Friday June 26, 2026 12:15pm - 2:15pm CEST
OWASP Juice Shop is probably the most modern and sophisticated insecure web application!
Come over with a cup of coffee and pwn the Juice Shop and get points in the Capture the Flag.
If you can show the “AppSec EU 2026” product description flag, you will get a special edition of the AppSec EU Juice Shop sticker.

Get to know how to perform secure coding workshops with the Juice Shop and the Juice Shop ecosystem.

Use our prepared laptops or bring your own (with Browser Developer Tools or ZAP installed)!

Talk with us about latest trends in the Juice Shop.
Speakers
avatar for Timo Pagel

Timo Pagel

Security architect, DevSecOps Consultant, DevSecOps Strategist
Timo has been in the IT industry for over twenty years. After being a system administrator and web developer in his early times, he became involved in OWASP. He now advises his clients on DevOps security, either as a strategist, hands on or as a trainer, with the focus on security... Read More →
avatar for Jannik Hollenbach

Jannik Hollenbach

Jannik is Project Lead of the OWASP Juice Shop and OWASP secureCodeBox projects. Working on anything from Kubernetes to Javascript and trying to make it a bit more secure.
Friday June 26, 2026 12:15pm - 2:15pm CEST
Room -2.92 (Level -2)

12:15pm CEST

Teaching Security Concepts Using Physical Analogies
Friday June 26, 2026 12:15pm - 2:15pm CEST
Understanding security fundamentals doesn’t have to be dry or abstract. In this interactive CF‑Pod, you’ll explore the core principles of confidentiality, integrity, and availability through surprising physical demonstrations and simple “magic‑like” activities that make each concept intuitive and memorable.

Each station focuses on one security principle and offers a short, hands‑on challenge that transforms an abstract idea into something you can see, touch, and explain to others. You can drop in for 10–15 minutes, try an activity, and walk away with a clear, practical analogy you can use in real‑world conversations with teammates and stakeholders.

Whether you're new to security or looking for better ways to teach it, this session will give you fun, effective tools for communicating the foundations of secure systems.
Speakers
MD

Mariia Denysenko

Cybersecurity Governance & Training Professional in IT, AI, and OT

Mariia is a cybersecurity governance and compliance professional with experience spanning IT security, AI security, and OT security. She focuses on developing secure processes, enabling teams, and translating complex security requirements into clear, actionable guidance.

Her backg... Read More →
Friday June 26, 2026 12:15pm - 2:15pm CEST
Room -2.92 (Level -2)

2:30pm CEST

Hands-On: Building Security Guardrails for AI-Generated Code
Friday June 26, 2026 2:30pm - 4:30pm CEST
AI-assisted development is now responsible for a significant and growing portion of production code. However, most AppSec programs still treat AI as an external input to be scanned after code is written, rather than as a system that can be guided to produce safer code up front.

In this Practical On-Demand session, participants will explore a secure-by-construction approach to AI coding using Cursor-style rules and hooks. The POD is structured around short, repeatable activities rather than a linear workshop.
Speakers
avatar for David Archer

David Archer

Solution Architect, Endor Labs

David is a long-time software practitioner who has spent the last two decades building, breaking, and fixing software across development, product, and consulting roles. After repeatedly seeing security treated as an afterthought in fast-moving teams, he shifted full-time into application... Read More →
Friday June 26, 2026 2:30pm - 4:30pm CEST
Room -2.92 (Level -2)

2:30pm CEST

The Old But Unforgettable Key
Friday June 26, 2026 2:30pm - 4:30pm CEST
Application security failures often stem from small, everyday oversights that quietly accumulate into serious risk. This Practical On-Demand (POD) activity lets participants explore how those issues surface in real applications by actively engaging with a deliberately vulnerable web app.

Attendees can drop in at any time and participate in a self-paced, Capture the Flag (CTF) style challenge centred on investigation, experimentation, and problem solving. Starting from a minimal application with limited guidance, participants uncover and connect security weaknesses to progressively increase their level of access.

The activity is designed to be accessible to all experience levels. Newcomers can engage with individual challenges and learn core AppSec concepts, while more experienced practitioners can pursue deeper exploration and more complex exploitation paths. All scenarios are inspired by issues commonly encountered in real world development environments.

Facilitators are present throughout the session to support participants, answer questions, and provide short, optional walkthroughs for those without laptops. The emphasis remains on doing, discovery, and practical takeaways, ensuring participants leave with a stronger intuition for identifying risk and concrete guidance they can apply in their own applications.
Speakers
avatar for Raul Cicos

Raul Cicos

Security Consultant, Intruder

Raul is an experienced information security professional specialising in offensive security. He brings deep expertise across the full penetration testing lifecycle, from reconnaissance and vulnerability analysis to exploitation and clear, actionable reporting. His work focuses on... Read More →
TS

Tom Steer

Security Consultant, Intruder

Tom is an experienced security professional focused on offensive security, conducting high-quality penetration tests and identifying vulnerabilities across systems and applications. In his free time, he designs and hosts Capture The Flag (CTF) challenges using them to deepen his skills... Read More →
Friday June 26, 2026 2:30pm - 4:30pm CEST
Room -2.92 (Level -2)

2:30pm CEST

“2001: Agentic Odyssey” When threat modelling meets HAL, agentic AI, testing and safety engineering
Friday June 26, 2026 2:30pm - 4:30pm CEST
“2001: Agentic Odyssey” is a hands-on, drop-in POD where we threat model the HAL 9000 system from 2001: A Space Odyssey as if it were a modern agentic AI system (LLM + tools + permissions + side effects). I bring a HAL DFD, and together we mark trust boundaries and do classic “what can go wrong?” threat identification. Participants then split into small groups to build attack-tree branches and translate them into Fault Tree Analysis (FTA) using AND/OR logic and minimal cut sets, including lightweight probability estimates to prioritise the most likely failure chains. We finish by turning those failure paths into automation-ready test ideas (fault injection, invariants, evidence), and optionally drafting a structured HAL threat model for submission to the OWASP Threat Model Library. Designed so anyone can contribute in 10-15 minutes, while advanced participants can go deep on FTA and prioritisation. Every stage is split into a way to enable drop-ins at any time.
Speakers
avatar for Petra Vukmirovic

Petra Vukmirovic

Head of Information Security at Numan and Fractional Head of Product, Devarmor

Petra is a technology enthusiast, leader and public speaker. A former emergency medicine doctor and competitive volleyball athlete, she thrives in challenging environments and loves creating order from chaos. Initially pursuing a medical career, Petra's passion for technology led... Read More →
Friday June 26, 2026 2:30pm - 4:30pm CEST
Room -2.92 (Level -2)
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.