- Øredev 2013 - How attackers attack your smartphones and tablets
- Oredev 2014 - Coding in a world of cyber crime cyber threats and espionage
- Øredev 2014 - Coding in a world of cyber crime cyber threats and espionage
- Øredev 2014 - File Upload - Inviting the Vampires
- Øredev 2014 - Making Zombies
- Øredev 2014 - Protecting your app data from attackers
- Øredev 2014 - Secure coding patterns
- Øredev 2014 - Security For Developers
- Øredev 2014 - Security in web apps
- Øredev 2014 - Where and how do we build our app
- Security Conference 2015 - Amazing advances in HTTPS are here. Now it’s your turn.
- Security Conference 2015 - Designing for Security through Threat Modelling
- Security Conference 2015 - File upload – Inviting the Vampires
- Security Conference 2015 - Improve Your Security by Running in the Cloud
- Security Conference 2015 - Keynote - Security in Your Code Defines the Future
- Security Conference 2015 - Lightweight Security Protocols for the Internet of Things
- Security Conference 2015 - Protecting your app data from attackers
- Security Conference 2015 - Secure APIs - Use identity management to handle mobile...
- Security Conference 2015 - Secure coding patterns
- Security Conference 2015 - Security in web apps
- Security Conference 2015 - Website Security
- Security Conference 2015 - Where and how do we build our app
- Security Summit 2014 - 2. Hack a Mac, pwn an iPhone & void a Droid
- Security Summit 2014 - 4. Molnet = Web, Web = sårbart!