© Mapbox, © OpenStreetMap

Most Active Speaker

Wesley Cabus

Wesley Cabus

Coding Architect, Coffee Enthusiast

Antwerpen, Belgium

Actions

Wesley is a Coding Architect at Xebia in Belgium, where he helps organizations to build better applications, helps teams to improve their skills and organizes workshops to share his knowledge.

He's also a Microsoft MVP, crew member at Techorama, board member of the VISUG meetup in Belgium and speaker at conferences and meetups.

Awards

Area of Expertise

  • Health & Medical
  • Information & Communications Technology

Topics

  • .NET
  • .NET Backend
  • .net core
  • .NET Patterns & Practices
  • ASP .NET Core
  • ASP.NET
  • Application Security
  • OAuth2
  • OpenID Connect
  • C#

Are you sure your access tokens are really secure?

You've read about OAuth 2.0 and decided to secure your web API using JWT access tokens. To implement this, you're likely relying on an open-source library to parse and validate these tokens, confident that your configuration will only accept tokens from your trusted issuer or token service.

But here's the real question: are you absolutely certain that your API only accepts access tokens issued by your service?

In this session, I’ll expose some shocking tricks that can bypass improperly configured token validation. You’ll see firsthand how easy it can be to fool your API if you’re not careful. But don’t worry, I’ll also walk you through how to write tests that ensure your application is protected against these exploits, keeping your data and users safe.

From Pong to Playstation: The Evolution of Video Games

Blip... Blip... Blip...
Those were the captivating sounds that echoed from the game Pong back in 1972, accompanied by a handful of pixels bouncing across the screen.

This session invites you to fast forward from those simple beginnings to today's gaming world, illuminated by ray-traced graphics and orchestrated soundtracks, transforming the humble blips of Pong into a grand symphony of digital artistry.

Let's revisit key moments that have forever shaped the landscape of video games, leading us to the immersive gaming experiences we enjoy today. Whether you're a veteran gamer or just a casual player, this nostalgic expedition promises to be an enlightening, entertaining, and engaging experience.

READY.
LOAD

PRESS PLAY ON TAPE

Hardening ASP.NET Core Web applications

At some point, you will or should have your web applications submitted to a penetration test or security assessment. In this test, a team of security engineers will poke your API and Web Apps to see if they can get different results than expected.

But have no fear! I will show you how you can harden your web applications by addressing a lot of common risks:
- fingerprinting
- proper use of cookies
- adding several security-related HTTP headers

In this session, I'll demonstrate hardening ASP.NET Core web apps, but you can also apply this knowledge to other web application technologies.

Unraveling the Battle of the Cloud Titans – App Services vs. AKS vs. Container Apps

The cloud evolves faster than you can imagine, and choosing the right platform for deploying and managing applications can be a daunting task.

Let's shed light on the strengths and weaknesses of three popular Azure solutions: Azure App Services, Azure Kubernetes Service (AKS), and Azure Container Apps.
By delving into their unique features, performance characteristics, and scalability options, you will gain a comprehensive understanding of which solution best aligns with your application needs.

Preparing web applications for security assessments

At some point, you will have your web applications being submitted to a pen-test or security assessment, where a team of security engineers will poke your API and Web Apps to see if they can get different results than expected.

In this workshop, we're going to harden our API and Web application by addressing a lot of common risks:
- fingerprinting
- proper use of cookies
- adding several security-related HTTP headers
- checking our dependencies for vulnerabilities

We'll be using .NET mostly but the concepts will apply to Java, React, Angular and other frameworks as well.

Emulating a Game Boy in .NET 6

In 1989, Nintendo released their first handheld console with cartridges, the Game Boy, which sold over 100 million of units. This device has been the inspiration for game developers around the world to start creating games, and even today, games are still being created for the Game Boy, although not officially on cartridges.

Enter the world of emulation, where the Game Boy is now available as a .NET 6 project. Want to know more about how to emulate a CPU, graphical unit, hardware interrupts and more? Let's dive into C# code and dusty hardware manuals on this journey back to our favorite Italian plumber.

Building a feature-rich OpenID Connect Identity and Access Management Platform

Identity and access management (IAM in short) is critical to protecting confidential data and applications. With the increasing adoption of cloud-based applications, building a scalable and secure identity and access management platform is a must for organizations of all sizes.

In this session, you'll learn about the journey of building an advanced IAM platform based on Duende IdentityServer. We'll discuss the standard capabilities of IdentityServer and explore how we extended it with features such as multi-factor authentication, home realm discovery, and user impersonation. You'll also learn about the best practices for building a resilient and secure platform, including strategies for handling scale and redundancy.

Whether you're just starting out with OpenID Connect or you're looking to take your identity and access management platform to the next level, this session is for you.

This session is not a sales pitch for Duende IdentityServer, I will also briefly mention what other options we considered and why the decision was made to go for Duende's solution.

Safety first! Low-level C# without the unsafe keyword

For a side project, I converted DooM from C to C#. Having to deal with strange file types, alternative ways of (re)allocating memory, data structures being passed around as void* pointers and the likes, it's tempting to use unsafe code in C#. Turns out, that's not needed!

In this session, let's look at how C translates to modern C#, and how C# adds safeguards to avoid shooting yourself in the foot.

Update Conference Prague 2024 Sessionize Event Upcoming

November 2024 Prague, Czechia

DevConf 2024 Sessionize Event Upcoming

October 2024 Łódź, Poland

Copenhagen Developers Festival 2024 Sessionize Event

August 2024 Copenhagen, Denmark

dotnetdays 2024 Sessionize Event

April 2024 Iaşi, Romania

NDC Sydney 2024 Sessionize Event

February 2024 Sydney, Australia

CloudBrew 2023 - A two-day Microsoft Azure event Sessionize Event

December 2023 Mechelen, Belgium

.NET Developer Conference '23 Sessionize Event

November 2023 Köln, Germany

Update Conference Prague 2023 Sessionize Event

November 2023 Prague, Czechia

Swetugg Gothenburg 2023 Sessionize Event

October 2023 Göteborg, Sweden

WeAreDevelopers World Congress 2023 Sessionize Event

July 2023 Berlin, Germany

Developer Week '23 Sessionize Event

June 2023 Nürnberg, Germany

NDC London 2023 Sessionize Event

January 2023 London, United Kingdom

VisugXL 2022 Sessionize Event

October 2022 Hasselt, Belgium

.NET DeveloperDays 2022 Sessionize Event

October 2022 Warsaw, Poland

Techorama Netherlands 2022 Sessionize Event

October 2022 Utrecht, The Netherlands

Techorama 2022 BE Sessionize Event

May 2022 Antwerpen, Belgium

DevSum 2022 Sessionize Event

May 2022 Stockholm, Sweden

VisugXL 2021 Sessionize Event

November 2021 Brussels, Belgium

VISUG Sessionize Event

December 2020

Build Stuff 2020 Lithuania Sessionize Event

November 2020

NDC Sydney 2019 Sessionize Event

October 2019 Sydney, Australia

Microsoft Techdays 2019 Sessionize Event

February 2019 Helsinki, Finland

Wesley Cabus

Coding Architect, Coffee Enthusiast

Antwerpen, Belgium

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top