DevCon is calling you to join a community of experts, leaders and like minded individuals to engage and empower your own learning experience! Check our Agenda and craft your own journey to the most important topics of the moment!
09:55 to 10:00
01 Nov 2023

Opening Speech

10:00 to 10:45
01 Nov 2023

Guardians of the IoT Realm: Defending Against Evolving Cyber Threats

Join us for an illuminating exploration of IoT's dual role: a catalyst for innovation and a magnet for cybersecurity perils.

10:50 to 11:35
01 Nov 2023

How to Hack an ATM – Penetrating ATMs

In this presentation, we will discuss real-world examples of cybersecurity issues with ATMs. 

11:40 to 12:25
01 Nov 2023

The Lifecycle of Innovative IoT Products

In this lecture, Dejan will discuss the evolution of IoT from 2015 to the present day, using examples as illustrations.

12:30 to 13:15
01 Nov 2023

Secure SDLC and the Next-Gen Developers

Working with many functions and teams for many years in large organizations, I experienced first had the cultural differences between developers and security teams. 

13:15 to 14:00
01 Nov 2023

Networking Lunch

14:00 to 14:45
01 Nov 2023

Securing the Future: Leveraging AWS for IoT and Machine Learning Cybersecurity

In the contemporary landscape, the Internet of Things (IoT) and Machine Learning (ML) are revolutionizing industries by enhancing efficiency, customization, and decision-making capabilities. 

  • Syed Rehan Avatar Syed Rehan Sr Global IoT Cybersecurity Specialist (AWS IoT Product team) at Amazon Web Services
14:50 to 15:35
01 Nov 2023

The Next API Revolution Will Be Wireless

The world of wireless connectivity is on the cusp of a major transformation, and it’s happening on your phone too.

15:40 to 16:25
01 Nov 2023

Building an AppSec Program: What I Wish I Had Been Told

This talk summarizes a four-year journey, where the initial goal was to establish an application security program within a sizable company with no specific security practices for applications.

16:30 to 17:15
01 Nov 2023

AWS Attack based on Misconfiguration

The Adversaries leverage the attack surface complexity to their advantage. 

  • Filipi Pires Avatar Filipi Pires Security Researcher and Cybersecurity Advocate at Senhasegura