Agenda
Check out the different topics, each representing a single block of talks and sessions to guide you through the program of DevTalks! We look forward to welcoming you to the event and providing you with an unforgettable learning and networking experience in the world of technology.
Powered by

10:50 to 11:35
Common cloud migration pain points and how to overcome them - based on practical experience
DevOps Stage — 45 minutes DevOps Kubernetes
There are different obstacles, respectively challenges that you’re facing when starting almost from scratch with the cloud migration of your application.
Read More...
Powered by

10:15 to 10:45
10:50 to 11:35
How Covid-19 and the war changed our cybersecurity landscape… Where will it all end and how to prepare?
Security Stage — 45 minutes Security
Undoubtedly, our cybersecurity landscape has dramatically changed over the last 3 years.
Read More...
11:40 to 12:10
Uncover the Secrets of PKCE: Elevating OAuth2.0 for security of native clients
Security Stage — 30 minutes Security
Discover the power of PKCE (Proof Key for Code Exchange), an OAuth2.0 extension.
Read More...
12:15 to 13:00
Breaking Free from the Laptop Shackles: The Virtual Revolution in Secure Application Development
Security Stage — 45 minutes Security
The need to secure corporate laptops spans across all functions of the organization, and software application development is one of them.
Read More...
14:00 to 14:45
Building a sustainable security requirements process with the ASVS
Security Stage — 45 minutes Security
14:50 to 15:20
HOW AI IS THREATENING DEVELOPERS JOBS
Security Stage — 30 minutes Security
1. Cyber Smart Defence - Stefanini Group - Who we are - Madalin
Dumitru (Cyber Smart Defence- part of Stefanini Group)
Read More...
15:25 to 16:10
The importance of asset management for cyber security
Security Stage — 45 minutes Security
Asset management plays a critical role in ensuring cybersecurity by effectively managing assets through various practices such as inventory management, tracking, patching, risk assessment, and incident response planning.
Read More...
16:15 to 16:45
What do/should you ask/expect from your Managed Security Services Provider?
Security Stage — 30 minutes Security
In an age of digital transformation and escalating
cyber threats, businesses must prioritize cybersecurity. However, not every
organization has the capacity or resources to manage this critical area
effectively in-house. That's where Managed Security Services Providers (MSSPs)
step in.
Read More...