Meet the industry experts sharing their knowledge at AppSec Days Singapore 2025
Leading expert sharing groundbreaking insights
Founder and CEO at SecDim
2024 set a new record with over 40,000 CVEs, a staggering 40% increase from the previous year. But raw vulnerability volume is only part of the story.
Application Security has evolved far beyond just fixing injection flaws. Over the past two decades, it has matured into a complex ecosystem encompassing automated code scanning, secure CI/CD pipelines, cloud-native security posture management, and most recently, AI copilots and autonomous remediation.
In this session, we will walk through the key milestones that have shaped modern AppSec. We will unpack emerging threats, the rise of DevSecOps, the growing mandate for SBOMs, and the dual-edged role of AI in both attacking and defending software.
You will leave with a clear understanding of today's AppSec landscape, the challenges that lie ahead, and the strategies needed to secure applications in 2025 and beyond.
Industry experts sharing their technical expertise
Senior Application Security Specialist, Sage
This talk will explore why traditional application security is failing—and how modern browser security features offer a way out. Instead of endlessly patching the same vulnerabilities, it's now possible to eliminate entire classes of bugs through proactive, scalable defenses. The session will dive into powerful new browser-native standards like Content Security Policy v3, Trusted Types, and Sec-Fetch-Metadata, and how they can prevent common attacks like XSS, CSRF, clickjacking, and cross-origin exploits.
Using real-world case studies, the talk will show how leading organizations have successfully adopted these features to secure their applications by design.
Threat Researcher and Technical Writer at BforeAI
This talk will explore the human side of cybersecurity, breaking the misconception that it is only about tools, code, and technical jargon. Rishika Desai shares her journey as a cybersecurity professional turned content creator, showing how storytelling and communication can make security more relatable and impactful. Through her experience, she highlights the power of building a personal brand and using content to educate, inspire, and connect.
In today's evolving security landscape, there is a growing need for not just engineers but also educators, communicators, and creators who can turn complexity into clarity. This session is for anyone looking to amplify their voice and make cybersecurity more accessible and human.
Director, Laburity
Director, Laburity
Directors, Laburity
This talk will explore the growing risks in software supply chain security, especially in the wake of high-profile incidents like Log4Shell. Based on large-scale in-house research, it investigates publicly available open-source assets—including over 2 million NPM packages, 60,000 WordPress plugins, and a wide range of Ruby Gems—to uncover exposed secrets such as AWS keys, Google credentials, and 30+ other sensitive types.
These exposures, whether accidental or intentional, pose a serious risk to any developer or organization using these components as dependencies. The session will present the scale and impact of the findings, along with practical ways to detect and prevent such leaks. Attendees will also learn how to integrate automated checks into their CI/CD pipelines to secure their supply chains and avoid becoming the next link in a compromised system.
Senior Security Engineer at Flipkart
Senior Security Engineer at Confluent
Senior Security Engineer at Flipkart & Senior Security Engineer at Confluent
Are you running Kubernetes on AWS? There's a high chance your EKS cluster on AWS cloud might be misconfigured and you're not even aware of it. This session dives into the common pitfalls that attackers exploit in AWS EKS environments, from supply chain compromises and IMDSv2 exploitation (leading to credential exfiltration) to pod breakouts.
Using the OWASP EKS Goat project, let's understand how these weaknesses translate into real-world cloud attack vectors and share immediate steps you can take to harden your clusters. Whether you are a CISO, CTO or a security engineer, this practical session is designed for anyone looking to strengthen their AWS security posture and get started with EKS security.
Senior Security Consultant
Principal Security Consultant
Senior Security Consultant & Principal Security Consultant, PastelOps
iOS reversing often feels more painful than it should be. Compared to Android, challenges like Mach-O binaries, stricter environments, and runtime protections often discourage testers or make them avoid it altogether. The speaker has faced these same roadblocks—where persistence alone wasn’t enough to make progress.
This talk will cover a practical workflow for iOS reversing, developed from real-world mobile assessments and leveraging open-source tools such as Frida, Ghidra, and a jailbroken iPad. It will walk through how to decompile and navigate Mach-O binaries, hook functions in running apps, and work around common issues like obfuscation and anti-debugging protections.
The goal is to make iOS reversing more approachable. Attendees will walk away with ready-to-use Frida snippets, a clear and repeatable workflow, and practical tips to overcome frustrating roadblocks—without spending extra money or wasting hours going in circles.
Chief Technology Officer, KAZIMI
Modern apps often rely heavily on advertising for revenue. To enable this, ad networks and analytics providers require their SDKs to be embedded within the app itself. However, these SDKs frequently contain exploits, vulnerabilities, invasive tracking mechanisms, and a range of questionable behaviors. This talk will uncover the techniques used by these SDKs and expose how much of the industry consistently prioritizes profits over the privacy and security of actual users.
Lead Security Engineer, Coupa Software
Sr. Security Engineer, Coupa Software
Lead Security Engineer & Sr. Security Engineer, Coupa Software
This talk will explore the hidden risks of deploying AI systems in critical functions like fraud detection, credit scoring, and customer support. As these models continuously learn from massive and ever-changing datasets—often pulled from public sources—they become vulnerable to subtle yet dangerous manipulations. The session will dive into how attackers can poison as little as 0.1% of training data, upload "trusted" but malicious models, or craft prompts that bend the model's behavior without triggering alarms.
Through live demos, the audience will witness a credit-risk model being flipped from "deny" to "approve" and a customer service LLM being transformed into a malware tutor. The session will conclude with a hands-on safety toolkit covering signed model manifests, secure download practices, prompt guardrails, and real-time anomaly monitoring—practical steps to help organizations ensure their AI continues to serve them, not sabotage them.
Security Researcher
This talk will explore the uncomfortable truth behind multi-factor authentication (MFA)—often hailed as the ultimate fix for authentication-related security issues. While MFA adds a layer of protection beyond passwords, attackers have evolved just as quickly. With over a million MFA bypass attacks occurring every month, it's clear that this trusted safeguard isn't foolproof. Through live demonstrations, this session will showcase how modern threat actors seamlessly bypass MFA and take over accounts in real time. Attendees will gain insight into advanced attack techniques and learn why relying solely on MFA may not be enough to sleep soundly at night.
Leader of Security Detection, Apex Security
Enterprise AI agents sit at the center of modern corporate workflows, wired into RAG pipelines and privileged data stores. While headlines focus on external attackers, insider misuse has quietly multiplied. This talk unveils a new OWASP taxonomy for enterprise agents, dissects a real‑world Fortune 500 breach in which leaked earnings data rocked the C‑suite, and closes with concrete controls security teams can deploy today to keep their agents, and their organizations safe.
SquareX Security Researcher
Identity has become the attacker’s fastest path to sensitive data and systems. This session will analyze adversary-in-the-middle techniques in the browser, including token theft, session hijacking, and credential replay. We will demonstrate how these attacks evade MFA and other controls that enterprises rely on. The talk will conclude with detection and mitigation strategies for defending identity at the browser layer.
Security Engineer at Yandex Cloud
This talk will explore key security risks in AWS Lambda functions and how attackers can exploit them if not properly secured. It will begin with a quick overview of Lambda's structure and benefits—such as scalability and reduced operational overhead—before diving into a NIST 830-based security assessment approach. The session will highlight critical risks including RCE backdoors, environment variable leaks, SSRF, and fork bombs, along with their real-world impact, such as excessive billing.
Live demos will showcase command injection and SSRF attacks in action. Attendees will leave with practical mitigation strategies like input validation, IAM role separation, and setting up effective logging and alarms to strengthen their serverless security posture.
Principal Security Consultant at DevSecOps
This talk will explore how AI development pipelines are emerging as a critical attack surface that traditional DevSecOps was never designed to secure. As organizations race to build and deploy machine learning models, attackers are exploiting weaknesses in training data, model dependencies, and inference endpoints—bypassing conventional application security controls.
Through live demonstrations, the session will show how poisoned training data, dependency confusion, and model tampering can quietly compromise AI systems. It will then present practical, AI-specific defenses that integrate seamlessly into existing CI/CD workflows, ensuring security without slowing development.