Roman Romanov
Pentestit, Orel

The illusion of security or how web applications are compromised

How an attacker can compromise a web resource and how to defend against it.
  • How web resources are compromised (overview of common vulnerabilities or configuration errors).
  • Attacks that you won't notice.
  • WAF bypass.
  • Machine learning revolt (analysis of the advantages and disadvantages of ML/AI).
  • How DevOps can sleep in peace.
Audience level
Regular Talk (40 min)


{{ comment.DateCreated | date: 'dd.MM.yyyy' }}
Your review is now here. Continue to communicate with the speaker
Chat with us, we are online!