<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>InfoQ - Security - Presentations</title>
    <link>https://www.infoq.com</link>
    <description>InfoQ Security Presentations feed</description>
    <item>
      <title>Presentation: Are We Ready for the Next Cyber Security Crisis Like Log4shell?</title>
      <link>https://www.infoq.com/presentations/cyber-security-log4shell/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Security-presentations</link>
      <description>&lt;img src="https://res.infoq.com/presentations/cyber-security-log4shell/en/mediumimage/Soroosh-Khodami-medium-1774441157934.jpeg"/&gt;&lt;p&gt;Soroosh Khodami discusses why we aren't ready for the next Log4Shell. He shares live demos of dependency confusion and compromised builds, explaining how minor oversights gift hackers total system access. He explains the value of Software Bill of Materials (SBOM), dependency firewalls, and shifting security left to build resilient DevSecOps cultures that protect the modern software supply chain.&lt;/p&gt; &lt;i&gt;By Soroosh Khodami&lt;/i&gt;</description>
      <category>log4j</category>
      <category>Security</category>
      <category>Transcripts</category>
      <category>InfoQ Dev Summit Munich 2025</category>
      <category>Development</category>
      <category>Architecture &amp; Design</category>
      <category>presentation</category>
      <pubDate>Mon, 30 Mar 2026 12:18:00 GMT</pubDate>
      <guid>https://www.infoq.com/presentations/cyber-security-log4shell/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Security-presentations</guid>
      <dc:creator>Soroosh Khodami</dc:creator>
      <dc:date>2026-03-30T12:18:00Z</dc:date>
      <dc:identifier>/presentations/cyber-security-log4shell/en</dc:identifier>
    </item>
    <item>
      <title>Presentation: Security and Architecture: to Betray One is to Destroy Both</title>
      <link>https://www.infoq.com/presentations/security-architecture-systemic-vulnerabilities/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Security-presentations</link>
      <description>&lt;img src="https://res.infoq.com/presentations/security-architecture-systemic-vulnerabilities/en/mediumimage/shana-dacres-medium-1772017261672.jpg"/&gt;&lt;p&gt;Shana Dacres-Lawrence explains the complex relationship between security and architecture, identifying three types of "betrayal" - physical, emotional, and trust - that lead to systemic failure. Drawing on real-world incidents like CrowdStrike and Change Healthcare, she shares five defense strategies: open communication, automation, tech integration, validation, and collaborative culture.&lt;/p&gt; &lt;i&gt;By Shana Dacres-Lawrence&lt;/i&gt;</description>
      <category>QCon London 2025</category>
      <category>Security</category>
      <category>Transcripts</category>
      <category>Architecture</category>
      <category>Architecture &amp; Design</category>
      <category>presentation</category>
      <pubDate>Fri, 27 Mar 2026 09:27:00 GMT</pubDate>
      <guid>https://www.infoq.com/presentations/security-architecture-systemic-vulnerabilities/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Security-presentations</guid>
      <dc:creator>Shana Dacres-Lawrence</dc:creator>
      <dc:date>2026-03-27T09:27:00Z</dc:date>
      <dc:identifier>/presentations/security-architecture-systemic-vulnerabilities/en</dc:identifier>
    </item>
    <item>
      <title>Presentation: Panel: Security against Modern Threats</title>
      <link>https://www.infoq.com/presentations/security-challenges/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Security-presentations</link>
      <description>&lt;img src="https://res.infoq.com/presentations/security-challenges/en/mediumimage/Son2-1774526589071.jpg"/&gt;&lt;p&gt;The panelists discuss the dramatic escalation of software supply chain threats, from typosquatting to AI-generated vulnerabilities. They explain how to move beyond basic scanning by adopting a zero trust mindset toward CI/CD pipelines and external dependencies.&lt;/p&gt; &lt;i&gt;By Sonya Moisset, Andra Lezza, Stefania Chaplin, Celine Pypaert, Emma Yuan Fang&lt;/i&gt;</description>
      <category>Panel</category>
      <category>QCon London 2025</category>
      <category>Security</category>
      <category>Transcripts</category>
      <category>Development</category>
      <category>presentation</category>
      <pubDate>Wed, 25 Mar 2026 09:04:00 GMT</pubDate>
      <guid>https://www.infoq.com/presentations/security-challenges/?utm_campaign=infoq_content&amp;utm_source=infoq&amp;utm_medium=feed&amp;utm_term=Security-presentations</guid>
      <dc:creator>Sonya Moisset, Andra Lezza, Stefania Chaplin, Celine Pypaert, Emma Yuan Fang</dc:creator>
      <dc:date>2026-03-25T09:04:00Z</dc:date>
      <dc:identifier>/presentations/security-challenges/en</dc:identifier>
    </item>
  </channel>
</rss>
