-
Welcome & Opening Remarks
- BSides Belfast
-
Ten Years of Penetration Testing
- Holly Grace Williams
-
Hardware Hacking the Internet of Things (IoT)
- Deral Heiland
-
Detection-as-Code: Scaling SOC Operations
- Aaron Wilkinson
-
When SSL Fails: Tracing the SSL vuln to the
most shocking real world impacts
- Michelle Simpson
-
Never mind the threat hunting
here comes signals engineering
- Peter Hanily
-
Domain Persistence in Active Directory:
Detection, Triage, and Recovery
- Nico
-
Virtually Networkless
- A dive into VSOCKs
- Izzy Whistlecroft
-
Malware Code Similarity Through Vectorsearch
- Remco Sprooten
-
Hack the system: exploring libpam
with uprobes and eBPF
- Peter McConnell
-
Hackers with Radios: Security and the Physical Layer
- Mark Megarry
-
Patient data and where to find it
- Stuart Kurutac
-
A Lazy Programmer’s Tips for Avoiding the SOC
- Stuart McMurray
-
Automation: The cause of, and solution to,
all of our problems
- Jonny Milliken
-
Metrics that Matter:
how to Choose Cloud Security KPIs For Your Business
- Emma Fang
-
Hungry for love. Online romance fraud
tactics and why they are so efficient.
- Tanya Vacarda
-
Post Quantum Migration
- Whats the crack?
- Dr. Syed Zia
-
The Great SAM Hunt of 2022;
Or The Value of Divergent Thought
- @LegendaryPatMan
-
Teaching AI To Protect Planes
- Matthew Reaney
-
No more alert(1)
- Gr4y R0se
-
Imposter Syndrome Yay or Nay
- Jude McCorry
-
Closing Remarks & Presentation Of CTF Prizes
- BSides Belfast