-
Welcome
- David Zilberberg
-
Unearthing The Secrets Of Securing A
160-Year-Old Railway: Beyond The Basics!
- Pete G
-
Security Is Key:
The Vulnerabilities Of API Security
- Joe Wrieden
-
Your Friendly Neighbourhood Penguin:
Using Linux And WSL To Stay Under The Radar
- Idan Ron and Max De Lacey
-
XS-Leaks:
Client-Side Attacks In A Post-XSS World
- Zeyu (Zayne) Zhang
-
The Simple Approach To
Security Risk Management
- Asher Selman
-
Exploring The Dark Web:
Forums, Markets, And Scam Insights
- Stefan Bargan
-
"Open, Sesame!" - Unlocking Bluetooth
Padlocks With Polite Requests
- Miłosz Gaczkowski and Alex Pettifer
-
Breaking Bad Multifactor:
MFA Bypasses And How To Assess The Risks
- Chester Wisniewski
-
Connected Chaos: Uncovering Router
Vulnerabilities Via Cloud API Connections
- Vangelis Stykas
-
A Talk About Cross-Site Scripting (XSS) In 2023?
The Mitigated Unmitigated Vulnerability.
- Val Resh
-
In Space;
Everyone Can Hear Your Downlink
- Minus
-
Red Teaming On
Critical Infrastructure
- Granit Beka
-
Game Of Codes: QR Thrones, Image Battles,
And The Quest For Initial Access
- Josh Kamdjou
-
Oh My Phish!
- Theram and Dhruv Bisani
-
An Abridged History Of Malware
- Olivia Betts
-
Cloudy With A
Chance Of Security
- Sascha Bharath
-
Wires Gone Rogue:
IoT Security At The Cable Level
- Aunart Grajqevci
-
The (Non)Inclusivity Of InfoSec:
My Experience
- Dan Ogleby
-
The Internet Never Forgets: OSINT'ing
Myself To Uncover 30 Years Of Data Leakage
- Thomas Preece
-
Elevate & Conquer:
A Journey Into Kernel Exploitation
- Tijme Gommers
-
Soc Adventurez In TiETW
- Luke Jones
-
Exploring Retail’s
Cyber Threat Landscape
- Alexandra Forsyth
-
Game Hackers And You:
Knowledge Extraction From Toxic Places
- Morgan Brazier
-
Abusing RWX-S Binaries
For Post-exploitation
- At0m
-
Anti-forensics Techniques Used
By Threat Actors In The Wild
- Hela Lucas
-
Decentralization: Mo' Systems, Mo'
Bridges, Mo' Comms, ... Mo' Problems?
- Maya Boeckh
-
Breaking The Cloud:
A Tale Of 3 Breaches!
- Ashish Rajan
-
ASR Fatigue Reduction:
Managing Attack Surface Reduction Rules
- James Stewart
-
The Art Of Cyber Deception
- Joshua Wardle
-
Off The Hinge: Dating With OSINT
- Taylor Rhoades
-
Physical Intrusion - Access Un-Controlled
- Iain Parkes
-
Scaling Detection And Response Teams:
Enabling Efficient Investigations
- James Dorgan
-
Slightly SOSL'ed:
Locating And Testing SOSL Injection
- Nick Dunn
-
Ethical Hacking: Navigating The
Modern Ethical And Moral Landscape
- Muhammed Aanish Butt
-
Cyber Resilience In Industry 4.0:
Strengthening Standards And Embracing Emerging Tech
- Shaza Al-Haddad
-
Bugs Are Shallow:
Finding Vulnerabilities In Top GitHub Projects
- Laurence Tennant
-
Beyond The Code / SBOM:
Supply Chain Security
- Anant Shrivastava
-
Automated Wargaming
Of A Chemical Plant
- Martyn
-
Of Microchips And Mammals
- Elliott Nash
-
DevSecOps On A Budget: Building A Secure
Development Pipeline Without Breaking The Bank
- Robbie Thandi
-
Closing
- Brian Whelton