SecAppDev 2026 - Architecture
SecAppDev 2026 offers three days of in-depth lectures and two days of hands-on workshops. Use the buttons below to navigate between the topics. The full schedule shows all sessions.
AI / ML security
Threat modeling
OWASP top 10
Authorization
Architecture
Secure Coding
Supply chain security
Web security
Cryptography
Governance
Application Security
Privacy
Offensive security
OAuth 2.1 Best Practices
Deep-dive lecture by Philippe De Ryck in room Lemaire
Monday June 1st, 16:00 - 17:30
A practical and up-to-date overview of OAuth 2.1, covering core concepts, modern security best practices, and key extensions like PAR and DPoP, with guidance on applying them in real-world architectures and preparing for what’s coming next.
Key takeaway: Learn how to apply OAuth 2.1 best practices and supporting technologies to build secure applications and stay aligned with evolving standards.
Secure by Design — Ideas and Techniques
Introductory lecture by Dan Bergh Johnsson and Daniel Deogun in room West Wing
Monday June 1st, 11:00 - 12:30
Security is a design concern, not just an implementation concern. This session shows how domain modelling, type design, and boundary thinking can structurally eliminate entire classes of vulnerability - before attackers ever get a chance.
Key takeaway: Security is a quality aspect of software - like maintainability or correctness. Teams that design for quality get security as an emergent benefit
Model Context Protocol (MCP) Security
Advanced lecture by Jim Manico in room West Wing
Tuesday June 2nd, 11:00 - 12:30
An introduction to the Model Context Protocol (MCP) and its security risks. Covers MCP architecture, threat models, and practical defenses to prevent prompt injection, tool abuse, and data leakage in AI tool integrations.
Key takeaway: Understand MCP risks and apply concrete controls to secure AI tool integrations and prevent prompt injection, tool abuse, and data exfiltration.
Secure by Design — A Design Lens on Real Breaches
Deep-dive lecture by Daniel Deogun and Dan Bergh Johnsson in room Lemaire
Wednesday June 3rd, 09:00 - 10:30
Real breaches, analysed not for how they were exploited but for why they were exploitable. Each reveals a design omission that Secure by Design thinking could have caught — and a lesson you can apply to your own systems.
Key takeaway: Breaches have root causes deeper than the exploit. Learn to trace them back to design omissions
Designing "least-authority" JavaScript apps
Deep-dive lecture by Tom Van Cutsem in room West Wing
Tuesday June 2nd, 16:00 - 17:30
Learn the problems and solutions of combining "trusted" and "untrusted" JavaScript. We introduce secure dialects of JavaScript and practical tools that help to prevent supply-chain attacks from third-party modules.
Key takeaway: Learn how to get "trusted" and "untrusted" JavaScript to safely co-exist in your app.