SecAppDev 2026 lecture details

Secure by Design — A Design Lens on Real Breaches

Real breaches, analysed not for how they were exploited but for why they were exploitable. Each reveals a design omission that Secure by Design thinking could have caught — and a lesson you can apply to your own systems.

Wednesday June 3rd, 09:00 - 10:30
Room Lemaire
Abstract

When a breach happens, post-mortems focus on what was exploited. But there's a more uncomfortable question: why was it exploitable at all? In most cases the answer isn't a missing patch — it's a design question nobody asked.

We take real, high-profile cases and do a different kind of analysis, looking past exploit mechanics to ask: what design omission made this structurally possible? The vulnerability wasn't introduced. It was never designed out. You'll leave with a new way of reading breach reports and new questions to bring back to your own systems.

Key takeaway

Breaches have root causes deeper than the exploit. Learn to trace them back to design omissions

Content level

Deep-dive

Target audience

Developers, architects, and security practitioners who reason about incidents at the design level.

Prerequisites

Some familiarity with Secure by Design thinking is helpful — but curious, experienced practitioners will find their footing quickly.

Join us for SecAppDev. You will not regret it!

Grab your seat now
Daniel Deogun
Daniel Deogun

CTO, Omegapoint

Expertise: High quality system development and security

More details

Dan Bergh Johnsson
Dan Bergh Johnsson

AI Head, Omegapoint

Expertise: High quality system development and security, with side-dish of Agile and AI

More details

Join us for SecAppDev. You will not regret it!

Grab your seat now

Related lectures

SecAppDev offers the most in-depth content you will find in a conference setting

Grab your seat now