-
You're Gunna Need A Bigger Boat
- Lisa Forte
-
Building Effective Vulnerability
Risk Scoring Systems
- Harri Renney
-
Securing AI
- Seth
-
Not Another AI Talk
- Sarah Connelly
-
DevSecOps Leadership:
Zero To Hero
- Seb Coles
-
Everything Online Can
Be Faked. Here's How
- Wayne May
-
Hey - Doesn’t That Cloud Look Like All Your Data?
Current And Novel Methods Of Finding Exposed Cloud Assets
- Shahnoor Kiani
-
Cyber Crime Case Studies:
Key Insights And Lessons Learned
- Sam P
-
Working Against The Clock:
Cyber Security - The Infinite Game
- Ryan Pullen
-
Growing Up Digital:
Cyber Awareness For Today's Youth
- Joe Wells
-
Making Consistent STRIDEs
With Threat Modeling Templates
- Andrea Jones
-
Domain Name Stupidity
- Liam Follin
-
Securing Protocols With
(Not So) Formal Methods
- Jean Snyman
-
Human Error Breaches
Are Bullsh*t
- Marius Poskus
-
Using Machine Learning To
Identify Threat Actors Online
- James Stevenson
-
Clash Of Cultures? Bringing
Cybersecurity Into (Aero)space Safety
- Emma Taylor
-
Portscanning with Powershell
- James Conlan
-
API Scraping For Swim & Profit
- Melissa Augustine Goldsmith
-
How To Bypass Million Dollar Cyber Security
Solutions: War Stories Of A Social Engineer
- Chris Pritchard
-
Cognitive Defenders:
How AI Transforms Cyber Security
- Rosalind Grindrod
-
How I Leant To Love My Superpower
- Daniel Walters and Ben Docherty