Visit the AppSec Village to explore application security through practical, hands-on activities. Engage with top experts, discover innovative approaches, and learn about securing the software attack surface.

Village Hours

Moscone South, Level 2, Room 204

Day 1 Tuesday, March 24 9:30am - 6pm*
Day 2 Wednesday, March 25 9:30am - 4:30pm
Day 3 Thursday, March 26 9:30am - 2:00pm
* Villages are closed from 3:15-4pm for CyBEER Ops setup

Moscone West Connection Hub

Day 1 Only

Tuesday, March 24

8:30am - 10:30am

Activity Schedule In Progress

Day 1 - March 24, 2026

09:30

09:30 - 11:30 POD 1

Hack the Duck Store

Escape

At a developer meetup on secure software development, we asked a simple question: look at this login form, how could a hacker abuse it? Not one developer in the room dared to answer. The referral code field looked harmless. The backend had no validation: self-referrals, circular referrals, unlimited...

More info...
09:30 - 11:30 POD 3

AppSec Quiz Gauntlet: Spot the Vulnerability

Checkmarx

In AppSec Quiz Gauntlet: Spot the Vulnerability, you’ll join a hands-on security quiz built around real-world software risks. Analyze suspicious dependencies, uncover typosquatted packages, decode obfuscated snippets, and identify hidden vulnerabilities in short code samples.

More info...
09:30 - 11:30 POD 2

The Call Stack Experience

Oligo

Let’s play with blocks… and learn how real application attacks unfold.

You will build real application call stacks, one foam block at a time, with each block representing function calls in a normal execution flow.

Once your stack is complete, you will see first-hand how easy it is for exploits...

More info...

11:30

11:30 - 13:30 POD 2

Cards Against Security: Trust Me, It's Secure

Chainguard

Join us for "Cards Against Security: Trust Me, It's Secure," a hilarious card game inspired by Cards Against Humanity! Test your wit as you create the funniest responses to prompts related to software development and security. Gather your friends at the AppSec Village and dive into a world of Chaing...

More info...
11:30 - 13:30 POD 1

Clash of Prompts: A Real-Time Prompt Battle Royale

Symbiotic

Step into the ring and prove your prompt-fu! In this fast-paced multiplayer game, you go head-to-head to craft the prompt that generates the most secure code - no keyboard coding allowed. Swing by for free play on Days 1 & 2 to warm up, then battle it out on Day 3 in our grand tournament for a very...

More info...
11:30 - 13:30 POD 3

NPM Imposters - The malware detection card game

Aikido

NPM Imposters is a fast-paced educational card game designed to teach players about supply chain security risks in software development, particularly through malicious NPM packages.

More info...

13:30

13:30 - 15:30 POD 3

Code Invaders: Stop The Insecure Code

Aikido

Recruit: help stop the Vibe Invasion. AI-generated code is flooding the frontier with insecure logic, and it’s your job to intercept it before it hits production. Vulnerable snippets (SQL injections, hardcoded secrets, broken crypto, and risky error handling) are falling toward the pipeline. Elimina...

More info...
13:30 - 15:30 POD 2

AI Risks Through the OWASP GenAI Security Project & FinBot CTF

Cybeats

This interactive session uses OWASP FinBot CTF to demonstrate how agentic AI systems can fail in practice and where their weaknesses emerge. Through a live walkthrough and audience participation, attendees will explore common agentic AI risk patterns and see how these issues play out in a realistic...

More info...
13:30 - 15:30 POD 1

Hack the Duck Store

Escape

At a developer meetup on secure software development, we asked a simple question: look at this login form, how could a hacker abuse it? Not one developer in the room dared to answer. The referral code field looked harmless. The backend had no validation: self-referrals, circular referrals, unlimited...

More info...

16:00

16:00 - 18:00 POD 1

The Call Stack Experience

Oligo

Let’s play with blocks… and learn how real application attacks unfold.

You will build real application call stacks, one foam block at a time, with each block representing function calls in a normal execution flow.

Once your stack is complete, you will see first-hand how easy it is for exploits...

More info...
16:00 - 18:00 POD 3

Clash of Prompts: A Real-Time Prompt Battle Royale

Symbiotic

Step into the ring and prove your prompt-fu! In this fast-paced multiplayer game, you go head-to-head to craft the prompt that generates the most secure code - no keyboard coding allowed. Swing by for free play on Days 1 & 2 to warm up, then battle it out on Day 3 in our grand tournament for a very...

More info...
16:00 - 18:00 POD 2

SBOM Find the Flaws

Cybeats

SBOM Find the Flaws is a short hands-on activity (with prizes!) where participants review SBOM files and identify intentional mistakes in the data, learning how to recognize common issues in software supply-chain documentation. Prizes will be Cassie Crossley's book or a solar-powered robot!

More info...

Day 2 - March 25, 2026

09:30

09:30 - 12:00 POD 2

IoT Pentest Blitz

Finite State

The IoT Pentest Blitz is a fast-paced, hands-on security assessment challenge designed to simulate real-world penetration testing (pentesting) of IoT devices. Participants engage in a structured testing process, leveraging various tools and methodologies to uncover vulnerabilities in IoT firmware, h...

More info...
09:30 - 12:00 POD 4

AI Pentesting Trivia Showdown

XBOW

Think you know AI pentesting? Put it to the test at this fast-paced, interactive trivia session at AppSec Village. AI Pentesting Trivia Showdown challenges participants with questions spanning offensive security fundamentals, real-world attack paths, AI-assisted testing concepts, vulnerability valid...

More info...
09:30 - 12:00 POD 3

AppSec Quiz Gauntlet: Spot the Vulnerability

Checkmarx

In AppSec Quiz Gauntlet: Spot the Vulnerability, you’ll join a hands-on security quiz built around real-world software risks. Analyze suspicious dependencies, uncover typosquatted packages, decode obfuscated snippets, and identify hidden vulnerabilities in short code samples.

More info...
09:30 - 12:00 POD 1

The Call Stack Experience

Oligo

Let’s play with blocks… and learn how real application attacks unfold.

You will build real application call stacks, one foam block at a time, with each block representing function calls in a normal execution flow.

Once your stack is complete, you will see first-hand how easy it is for exploits...

More info...

12:00

12:00 - 14:30 POD 2

IoT Pentest Blitz

Finite State

The IoT Pentest Blitz is a fast-paced, hands-on security assessment challenge designed to simulate real-world penetration testing (pentesting) of IoT devices. Participants engage in a structured testing process, leveraging various tools and methodologies to uncover vulnerabilities in IoT firmware, h...

More info...
12:00 - 14:30 POD 3

NPM Imposters - The malware detection card game

Aikido

NPM Imposters is a fast-paced educational card game designed to teach players about supply chain security risks in software development, particularly through malicious NPM packages.

More info...
12:00 - 14:30 POD 1

Cards Against Security: Trust Me, It's Secure

Chainguard

Join us for "Cards Against Security: Trust Me, It's Secure," a hilarious card game inspired by Cards Against Humanity! Test your wit as you create the funniest responses to prompts related to software development and security. Gather your friends at the AppSec Village and dive into a world of Chaing...

More info...

14:30

14:30 - 16:30 POD 2

Hack the Duck Store

Escape

At a developer meetup on secure software development, we asked a simple question: look at this login form, how could a hacker abuse it? Not one developer in the room dared to answer. The referral code field looked harmless. The backend had no validation: self-referrals, circular referrals, unlimited...

More info...
14:30 - 16:30 POD 3

Code Invaders: Stop The Insecure Code

Aikido

Recruit: help stop the Vibe Invasion. AI-generated code is flooding the frontier with insecure logic, and it’s your job to intercept it before it hits production. Vulnerable snippets (SQL injections, hardcoded secrets, broken crypto, and risky error handling) are falling toward the pipeline. Elimina...

More info...
14:30 - 16:30 POD 1

Cards Against Security: Trust Me, It's Secure

Chainguard

Join us for "Cards Against Security: Trust Me, It's Secure," a hilarious card game inspired by Cards Against Humanity! Test your wit as you create the funniest responses to prompts related to software development and security. Gather your friends at the AppSec Village and dive into a world of Chaing...

More info...

Day 3 - March 26, 2026

09:30

09:30 - 12:00 POD 2

OWASP GenAI Security Project - AIBOM Generator: From Model Transparency to AI Risk Management

Cybeats

This session walks through a practical AIBOM lifecycle using the open-source OWASP GenAI Security Project's AIBOM Generator, from generating an AIBOM for an AI model to using it for transparency, risk visibility, and downstream risk management activities. Attendees will see how AIBOM can help captur...

More info...
09:30 - 12:00 POD 1

Cards Against Security: Trust Me, It's Secure

Chainguard

Join us for "Cards Against Security: Trust Me, It's Secure," a hilarious card game inspired by Cards Against Humanity! Test your wit as you create the funniest responses to prompts related to software development and security. Gather your friends at the AppSec Village and dive into a world of Chaing...

More info...
09:30 - 12:00 POD 3

AppSec Quiz Gauntlet: Spot the Vulnerability

Checkmarx

In AppSec Quiz Gauntlet: Spot the Vulnerability, you’ll join a hands-on security quiz built around real-world software risks. Analyze suspicious dependencies, uncover typosquatted packages, decode obfuscated snippets, and identify hidden vulnerabilities in short code samples.

More info...

12:00

12:00 - 14:00 POD 1

IoT Pentest Blitz

Finite State

The IoT Pentest Blitz is a fast-paced, hands-on security assessment challenge designed to simulate real-world penetration testing (pentesting) of IoT devices. Participants engage in a structured testing process, leveraging various tools and methodologies to uncover vulnerabilities in IoT firmware, h...

More info...
12:00 - 14:00 POD 3

Clash of Prompts: A Real-Time Prompt Battle Royale

Symbiotic

Step into the ring and prove your prompt-fu! In this fast-paced multiplayer game, you go head-to-head to craft the prompt that generates the most secure code - no keyboard coding allowed. Swing by for free play on Days 1 & 2 to warm up, then battle it out on Day 3 in our grand tournament for a very...

More info...
12:00 - 14:00 POD 2

SBOM Find the Flaws

Cybeats

SBOM Find the Flaws is a short hands-on activity where participants review SBOM files and identify intentional mistakes in the data, learning how to recognize common issues in software supply-chain documentation.

More info...

Our 2026 Sponsors

Platinum Sponsors


Gold Sponsors


Silver Sponsors


Bronze Sponsors

Is your organization passionate about application security and want to sponsor?

Read on how to become a sponsor and checkout our available sponsorship opportunities.