-
Opening Remarks
- Mark Carney
-
How To Win Users And Influence Boards:
Tales From A Professional Stalker
- Zoë Rose
-
Check Yourself Before You Wreck Yourself
- Gem Hill
-
Weaponising Layer 8
- Khae
-
Open Source Supply Chains Non-Panel
- Marc Carney and friends
-
Automating Myself Out Of A Job:
A Pentester's Guide To Left Shifting Security
- Jay Harris
-
We Take Your Security Seriously. Or Do We?
- The Beer Farmers
-
Hardware Hacking, We Need To Go Deeper
- Meadow Ellis
-
Selling 0days By The Pound;
Does Responsible Disclosure Work?
- Saskia Coplans
-
War Games:
Simulating Cyber Incidents For Fun & Profit
- Steve Davies
-
Becoming Boba Fett: Hacking Companies For
Internet Glory While Not Dying In A Sarlacc Pit
- Andy Gill
-
So You Want To Be A Pentester?
- Peter Bassill
-
Confessions Of A Bug Bounty Triager
- Glenn Pegden
-
Ee By Packet Filter! (eBPF For Security Monitoring)
- James Ogden
-
Profiling The Attacker
- James Stevenson
-
Hacking Acorn Machines,
Or The Bad Old Days™, Or, My Misspent Youth
- Tom Hargreaves
-
Hackers, Hugs, & Drugs:
Mental Health In Infosec
- Amanda Berlin
-
Closing Remarks
- Mark Carney