-
Welcome
- Craig Jones
-
Apple Apostles To Google Groupies:
Why We Need To Stop Security Tribalism
- John Shier And Chester Wisniewski
-
Bypassing Vehicle Infotainment Security
- Gareth Davies
-
Experience Of Phishing In W(h)ales
- Amila Perera
-
Will Language Protect Us From The Machines
- Leena Sarah Farhat
-
PARASITE: Can An Open Internet Fight Extremism?
- Dan Nash
-
Getting Ready For The Quantum World
- Jenny Potts
-
Know Your Worth – Are You Earning Enough
And How To Progress Your Career
- Karla Reffold
-
I Spy With My Little Eye
- Mike Polydorou and Vangelis Stykas
-
Innovation In The Area Of
Cyber Security Analytics
- Pete Burnap
-
Closed For Business: Taking Down Darknet Markets
- John Shier
-
A Journey Through MITRE Evaluation
- Alex Davies
-
How To Be A Hardware Criminal:
HID Attacks Made With Spit And Tape
- Meadow Ellis
-
An Overview Of Project Ava - Can Machine Learning
Be Used To Complement Web Penetration Testing?
- Matt Lewis
-
Closing
- Jack Whitter-Jones