He covers the following topics:
* Understanding Attackers
* Testing for SQL Injection
* Testing for SQL Account Privileges
* Probing the file system
* Replacing low level libraries (such as logging)
* Inference Attacks
It is a very good presentation which can open eyes especially to security risks mitigations that you can do to prevent much of what is shown here, such as strong naming assemblies, running under least-privileged accounts, etc.
Rocky's blog is definitely worth reading on a regular basis for security information.