Workshop: Building Your Risk-Oriented Application Security Program
![](https://i.ytimg.com/vi/-2S4rD5sWg0/mqdefault.jpg)
35:48
Learn Nuclei in 30 minutes - DEF CON Nuclei Demo
![](https://i.ytimg.com/vi/mZoOnWjv_QM/mqdefault.jpg)
34:41
How to Create a DevSecOps CI/CD Pipeline
![](https://i.ytimg.com/vi/FqnSAa2KmBI/mqdefault.jpg)
47:21
The Bug Hunter's Methodology - Application Analysis | Jason Haddix
![](https://i.ytimg.com/vi/3sSDQ_wLSzM/mqdefault.jpg)
19:47
Is AI Saving or Taking Jobs? Cybersecurity & Automation Impact
![](https://i.ytimg.com/vi/wYZpqy5w5Zw/mqdefault.jpg)
53:46
Tackling SAP Security Together – Building a Robust SAP SOC Framework
![](https://i.ytimg.com/vi/m1gKcr4RCF4/mqdefault.jpg)
8:53
Application Security 101: A Simple Guide
![](https://i.ytimg.com/vi/jpKFJmTs7iM/mqdefault.jpg)
8:52
Installing tools with PDTM | Getting started Part 2
![](https://i.ytimg.com/vi/FjrIf2W2uSM/mqdefault.jpg)
22:40