-
Living In A World With Pervasive
Vulnerability And Exploitation
- Ollie Whitehouse
-
Triaging 0-Days:
The Other Side Of MSRC Bug Bounty
- Izzy Whistlecroft
-
Advanced Paranoia For Developers
- Mark Allan
-
Integrating The Technical With The Social:
Maximising The Impact Of OSINT In Investigations
- Ruth McAlister
-
Dipping Our Toes
Into Cryptovirology
- Ryan Robinson
-
Criminal Cooperation:
Lessons From The Dark Side.
- Lara Sunday
-
The Safety Law Of
An Idiot Next To You
- Tanya Vacarda
-
Mobile App Vulnerabilities:
The Bad, The Worse And The Ugly
- Ray Kelly
-
Hardware-based Security:
Gimmick Or Game-Changer?
- Mantas Stadnik
-
Batter Up! Why Is Japan Still Batting
In The Minor League Of Cybersecurity?
- Ben Ellis
-
Finding Your Way In
Container Security
- Ksenia Peguero
-
From Likes To Leaks: Understanding
The Security Risks Of Social Media
- Anne-Marie O’Donnell
-
Security Lessons Learnt
From The Cloud Frontline
- Ben Fletcher
-
FIDObituary:
The Death Of Passwords
- Brendan “B” Burke
-
Cloud-Squatting: The Never-Ending Misery
Of Deleted And Forgotten Cloud Assets
- Abdullah Al-Sultani
-
Penetration Testing
Using Windows Features
- Niall Caffrey
-
Syscall Me Maybe - Reverse Engineering
Executables For Pentesting
- James Matchett
-
Navigating The Open-Source Security Fog:
A Case Study Of Messy Vulnerability Data
- Jamie Harris
-
Preparing Today For
Tomorrow’s Quantum Future
- Jaya Baloo
-
Conference Close
- BSides Belfast