Session
How Latest Browser Security Features Eliminate Bug Classes
Traditional application security is broken. We're stuck in a cycle of bug bounties, vulnerability reports, and endless patching - yet the same issues keep coming back. Despite years of "shifting left," vulnerabilities still regularly slip into production, leaving security teams firefighting instead of implementing meaningful safeguards. What if we could stop fixing vulnerabilities one by one and instead eliminate entire bug classes?
This talk explores how modern browser security features can automate and scale security effectively, allowing developers and security engineers to proactively remove entire classes of vulnerabilities - without relying solely on developers remembering security best practices.
The landscape of browser security standards has dramatically shifted, bringing powerful opt-in mechanisms that didn't exist three years ago, such as Content-Security-Policy v3, Trusted Types, Sec-Fetch-Metadata, and others. We'll examine how these standards can systematically prevent vulnerabilities like XSS, CSRF, clickjacking, and cross-origin attacks, transforming security from a reactive patching cycle into a proactive, scalable defense strategy.
Using real-world case studies, you'll see how leading organisations have leveraged these new browser-native security features to systematically eliminate vulnerabilities at scale. We'll discuss practical ways for teams to integrate these browser protections into their existing programs, automate security headers, enforce secure defaults across large-scale environments, and measure adoption effectively.
If you're a developer or security engineer, ready to move beyond endless vulnerability patching and start building applications that are secure by design, this session is for you. Learn how to automate, scale, and ultimately forget entire bug classes by harnessing the latest advances in browser security.

Javan Rasokat
Senior Application Security Specialist at Sage
Karlsruhe, Germany
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top