Watch the free recording of the IT Security Summit Conference today

Sign up for the newsletter now and get free access to six recordings of the IT Security Summit in June 2024

Increase your IT security with free exclusive expert recordings

Learn from leading experts how to strengthen your cyber resilience, secure APIs, detect hidden threats and implement modern security strategies.

Improving cyber resilience through targeted simulation of micro-attacks

Christian Schneider presents an innovative approach to improving cyber resilience through micro attack simulations and red teaming activities.

API keys, mTLS, OAuth2 or JWT? Which authentication suits the API project?

Tobias Polley shows how different authentication methods such as Mutual TLS, API keys, usernames/passwords, tokens, OAuth2 and OpenID Connect (OIDC) can be used to protect APIs.

JSON Web Tokens: Everything that can go wrong

Christian Wenz explains the specific security risks of Large Language Models (LLMs) and offers strategies and best practices for the secure handling of LLMs.

HTML and its dark side - An outline of mutation XSS (mXSS)

Mario Heiderich explains mXSS, a type of XSS attack that is difficult to detect and prevent, and shows how you can protect yourself against it.

LLM @ source code backup

Mirko Richter explains how LLMs can be used to improve the results of security source code analysis and make software development more efficient.

Domain Driven Security - how DDD supports the development of secure applications

Adrian Metzner shows how Domain Driven Design (DDD) can help to master complex domains, develop high-quality software and improve the security of applications at the same time.

Sign up for the newsletter and get free access to six recordings of the IT Security Summit in June 2024.

Take advantage of this unique opportunity to expand your knowledge – free of charge and conveniently online!

*Mandatory fields