SPEAKER |
TOPIC |
SESSION PPT |
VIDEO LINK |
|
Opening Keynote: IdentityShield Summit '25 – The Business of Cybersecurity - Trends & Transformations |
-
|
Watch Now |
|
Security - Past, Present & Future |
- |
Watch Now |
|
Cybersecurity in the Age of AI: Challenges, Opportunities, and Solutions |
- |
Watch Now |
|
The State of AI and Generative AI: Challenges and Opportunities |
- |
Watch Now |
|
Age of Accelerated AI: What it means to Identity Governance |
- |
Watch Now |
|
Certificates 101 - Understanding the Backbone of Digital Trust |
- |
Watch Now |
|
|
Your application has vulnerabilities and you missed them |
- |
Watch Now |
|
How to train your detection Dragon |
PPT Link
|
Watch Now |
|
Data Alchemy: Turning Insights into Strategic Gold |
PPT Link |
Watch Now |
|
From Access to Assurance: IAM's Critical Role in Meeting Compliance |
PPT Link |
Watch Now |
|
Generative AI: Balancing Application Performance & Security |
PPT Link |
Watch Now |
|
Shift-Left Security and DevSecOps Best Practices |
PPT Link |
Watch Now |
|
Behind the Scenes of Secure E-Commerce: A Developer’s Toolkit for Cyber Defense |
PPT Link |
Watch Now |
|
The Power of Encryption in Preventing Threats |
PPT Link |
- |
|
Broken Object Level Authorization (BOLA) Attacks on APIs |
PPT Link |
Watch Now |
|
Tackling New Cybersecurity Challenges for Gen AI |
PPT Link |
Watch Now |
|
How to Win Customers with Words That Work |
- |
Watch Now |
|
Cyber crime complaints and court proceedings |
- |
Watch Now |
|
AI-Powered Cybersecurity |
- |
Watch Now |
|
Governance of Enterprise Kubernetes Clusters On Amazon EKS |
PPT Link |
Watch Now |
|
Manage Access, Security, & Maintenance for the World's Most Popular CMS |
PPT Link |
Watch Now |
|
Securing Organizations in Cyberspace Using Cyber Threat Intelligence |
- |
Watch Now |
|
Gone in 60 Microseconds: Stopping IoT and Automotive Hacks |
- |
Watch Now |
|
Threat Modeling and Its Implementation in an Agile Cloud-Based Product |
PPT Link |
Watch Now |
|
The miniOrange Story |
- |
Watch Now |
|
Mastering Cloud Security: Best Practices Aligned with the MITRE ATT&CK Framework |
- |
Watch Now |
|
The Million Dollars At Stake: Exploring Security In Web3 |
- |
Watch Now |
|
Data Privacy 101 |
- |
Watch Now |
|
Doubledagger: Quantum Computing and It's Impact on Cybersecurity |
- |
Watch Now |
|
Building OAuth from First Principles |
- |
Watch Now |
|
Beyond the Paradox: Securing AI and Harnessing its Potential to Redefine Cybersecurity |
- |
Watch Now |
|
Prioritizing Cloud Security: A Comprehensive Risk-Based CSPM Strategy |
- |
Watch Now |
|
Active Directory Security: Mitigating LDAP Password Spray attacks using AD Tools |
PPT Link |
Watch Now |
|
Two-Way Trust: Securing Web Traffic with Mutual TLS (mTLS) |
PPT Link |
Watch Now |
|
Hacker vs Defender: Advanced Tactics and Techniques for Penetration Testing |
- |
Watch Now |
|
Identity Security in the Digital Age |
- |
Watch Now |
|
Grievance Management System, SIEM, Cyber Education, Mobile Application for threat analyzing |
- |
Watch Now |
|
From Coarse-Grained Roles to Fine-Grained Policies: Future Proofing Access Control |
PPT Link |
Watch Now |
|
Hack and Code : A programmers journey from hacking to secure coding |
- |
Watch Now |
|
From Deployment to Decommissioning: A Strategic Approach to Endpoint Security Lifecycle |
PPT Link |
Watch Now |
|
Battling Social Engineering in the Age of AI |
PPT Link |
Watch Now |
|
Modernizing Security Operations with Zero Trust Architecture on Multi Cloud |
- |
Watch Now |
|
Owning AWS via Exploiting Alfresco Components |
- |
- |
|
Foundation of Modern Cyber Defense: Building Resilient Security Frameworks |
PPT Link |
Watch Now |
|
Boost Speed, Enhance User Experience: Performance Optimization for WordPress Sites |
PPT Link |
Watch Now |
|
Future of Authentication: Password-less Security |
|
Watch Now |
|
How to be Safe from AI-driven Identity Scams? |
PPT Link |
Watch Now |
|
From Links to Locks: Building Secure Scalable Network Architectures |
PPT Link |
Watch Now |
|
Zero Trust Security for WordPress: Is It Feasible? Applying modern cybersecurity frameworks to WordPress environments |
PPT Link |
Watch Now |
|
Hack Me If You Can: Demonstration of Hacking and Preventing API Vulnerabilities |
- |
Watch Now |
|
Dark Web Basics, Threats And Accessibility |
- |
Watch Now |
|
Medical Device Cyber Security |
- |
Watch Now |
|
Innovative social media strategies to Drive Growth in the Modern Business Landscape |
PPT Link |
Watch Now |
|
Digital Identity: Shaping the future of Identity Management |
PPT Link |
Watch Now |
|
Cloud Data Security: Encrypting Data as It Leaves Your Network |
PPT Link |
Watch Now |
|
TLS Chronicles: The Past, Present, and Future |
PPT Link |
Watch Now |
|
Head in the clouds: The evolving cloud threadscape |
- |
- |
|
Identity at the Core: The IAM Blueprint for Zero Trust |
PPT Link |
Watch Now |
|
Need for Adversarial Debiasing in ML Models using Synthetic Data for Enhanced Security |
- |
Watch Now |
|
Cybersecurity: A New Priority in the Education Sector |
PPT Link |
Watch Now |
|
Advanced Asynchronous Programming Patterns in JavaScript |
PPT Link |
Watch Now |
|
Enabling Zero Trust: Real-Time Granular Access Control for Modern Workforces |
PPT Link |
Watch Now |
|
AI Bug Bounty |
- |
Watch Now |
|
AI Automation in Cybersecurity: Transforming Digital Defense |
- |
Watch Now |
|
Unmasking XSS Attacks in WordPress - Understanding & preventing security threats |
PPT Link |
Watch Now |
|
Panel Discussion |
- |
Watch Now |
|
Exploring Frontend Vulnerabilities: The Gateway to Hacking |
PPT Link |
Watch Now |
|
Unleashing Vulnerability Detection with Open Source Tools: Code, Defend, Deploy |
PPT Link |
- |
|
Your Money or Your Life - Framework from Google that keeps users safe |
PPT Link |
Watch Now |