#CNSCon continues with
"How to Generate VEX Automatically for Your Project" from Shlomo Heigh of CyberArk & Ben Hirschberg of ARMO

"Vulnerability in image is NOT equal to an application exploit"