![DevSecCon Singapore 2018](/conf/devseccon-singapore/devseccon-singapore_hu9de26927b2ec46b116dae37c83196956_1304474_800x0_resize_box_2.png)
February 2018
Security
![All-in-one security with open source tools](https://i3.ytimg.com/vi/j5wa5kPVlbE/hqdefault.jpg)
![All-in-one security with open source tools](https://i3.ytimg.com/vi/j5wa5kPVlbE/hqdefault.jpg)
All-in-one security with open source tools
All-in-one security with open source tools
February 2018
Security
![Closing Keynote: Measuring and maximizing vuln discovery efforts](https://i3.ytimg.com/vi/HoV6DphOQlQ/hqdefault.jpg)
![Closing Keynote: Measuring and maximizing vuln discovery efforts](https://i3.ytimg.com/vi/HoV6DphOQlQ/hqdefault.jpg)
Closing Keynote: Measuring and maximizing vuln discovery efforts
Closing Keynote: Measuring and maximizing vuln discovery efforts
February 2018
Security
![DevOps – An opportunity for better Security](https://i3.ytimg.com/vi/TDo1HcQErl4/hqdefault.jpg)
![DevOps – An opportunity for better Security](https://i3.ytimg.com/vi/TDo1HcQErl4/hqdefault.jpg)
DevOps – An opportunity for better Security
DevOps – An opportunity for better Security
February 2018
Security
![In graph we trust: Microservices, GraphQL and security challenges](https://i3.ytimg.com/vi/1N-O07SRuxY/hqdefault.jpg)
![In graph we trust: Microservices, GraphQL and security challenges](https://i3.ytimg.com/vi/1N-O07SRuxY/hqdefault.jpg)
In graph we trust: Microservices, GraphQL and security challenges
In graph we trust: Microservices, GraphQL and security challenges
February 2018
Security
![Opening Keynote: Lessons learned defending web applications in the age of DevOps/Cloud](https://i3.ytimg.com/vi/ygs3PDfGn6Y/hqdefault.jpg)
![Opening Keynote: Lessons learned defending web applications in the age of DevOps/Cloud](https://i3.ytimg.com/vi/ygs3PDfGn6Y/hqdefault.jpg)
Opening Keynote: Lessons learned defending web applications in the age of DevOps/Cloud
Opening Keynote: Lessons learned defending web applications in the age of DevOps/Cloud
February 2018
Security
![Securing automation and solving the Secret Zero problem.](https://i3.ytimg.com/vi/VLPnTccIXPg/hqdefault.jpg)
![Securing automation and solving the Secret Zero problem.](https://i3.ytimg.com/vi/VLPnTccIXPg/hqdefault.jpg)
Securing automation and solving the Secret Zero problem.
Securing automation and solving the Secret Zero problem.
February 2018
Security
![System call auditing made effective with machine learning and selective reporting](https://i3.ytimg.com/vi/Xy7yOmoalLg/hqdefault.jpg)
![System call auditing made effective with machine learning and selective reporting](https://i3.ytimg.com/vi/Xy7yOmoalLg/hqdefault.jpg)
System call auditing made effective with machine learning and selective reporting
System call auditing made effective with machine learning and selective reporting
February 2018
Security
![Variant Analysis – A critical step in handling vulnerabilities](https://i3.ytimg.com/vi/6WwP7eUY52Y/hqdefault.jpg)
![Variant Analysis – A critical step in handling vulnerabilities](https://i3.ytimg.com/vi/6WwP7eUY52Y/hqdefault.jpg)
Variant Analysis – A critical step in handling vulnerabilities
DevSecCon London 2018