-
Accelerating Progress: Shifting From A Reactive
To A Proactive Approach In Cybersecurity
- Heather Lowrie
-
Aftermath: The Human Cost Of Ransomware
- Adrian Taylor
-
Why Should Professionalism Matter To You?
- Debi McCormack
-
Is Your Phone Spying On You? An In-Depth Analysis
Of Vulnerabilities In Cisco VoIP Phones
- Balazs Bucsay
-
Prompt-ing The Injection:
LLMs Under Attack!
- Smitha Bhabal
-
HODL Your Keys:
How Seed Phrases Get Stolen
- Mykhailo Shtepa
-
Zero To Pentester:
My ‘root’ Into Cyber
- Ross Mitchell
-
Security Mismatch. Organisational Users Have
Different IT Expectations From System Administrators.
Using Organisational Culture To Close The Gap
- Richard Henson
-
One Flew Over The Auditors Nest
Dodging The Pitfalls Of Compliance
- Chris
-
Analyzing The Impact Of Spectre And Meltdown
Vulnerabilities On Modern Computing Systems: A Case Study
- Mohammed Mohtesham Ali and Abhishek Aggarwal
-
The Art Of Threat Modelling
- Paul Spruce
-
Black Belt Security:
Lessons From Karate
- Rudi Van Der Heide
-
Custom Scripts And Tools For
Pen Testing: a Beginner's Guide
- Adam Crease
-
Boost Your Organisation’s Cyber
Maturity With Offensive Security
- Eliza-May Austin
-
Ctrl Panic + Alt Response Plans + Del The Drama:
Best Practices For Incident Response
- SWRCCU Protect Officers
-
Cybersecurity Threats And
Attacks In Modern Manufacturing
- Achim D. Brucker
-
Battle-Tested Incident Recovery:
Lessons From The Front Lines
- Jack Hughes
-
The Uncomfortable War:
Keeping Kids Safe.
- Joe Wells
-
The Single-Packet Shovel: Digging For
Desync-Powered Request Tunnelling
- Thomas Stacey
-
Hacktivists V2.0
- Lisa Forte
-
Grand Social Engineering:
DevSecOps And Influence
- Seb Coles
-
Super Pets: The Hero You Didn't
Know You Had In Your House!
- Gary Cox
-
Beacon Harvest:
Conquering Cobalt Strike At Scale
- Ben (@polygonben)
-
Hacking The Job Market: Double Your
Chances Of Landing An Ethical Hacker Role
- Mikael Svall
-
Buffy Vs. Phishing: Slaying
Cyber Threats Sunnydale Style
- Andreea Mihai
-
Paint Me Like One Of Your Firmwares
- Callum T
-
The (Un)Natural History Of Malware
- Lena Yu
-
Closing Talk
- TBA