-
Welcome And Opening Rambles
- BSides MCR Crew
-
Breaking Out Of The Infosec Echo Chamber
- Gavin Millard
-
Breaking And Entering:
Hacking Consumer Security Systems
- Dominic Chell & Matt Hickey
-
21st Century War Stories!
- Ben Turner
-
Building Your Own Hardware
For Hardware Hacking
- Steve Lord
-
Gender Diversity In Cyber Security:
What Works?
- Jane Frankland
-
What's In Your Pocket?
- Henri Watson
-
From CSV To CMD To Qwerty
- Jerome Smith
-
Accessing The Personal Details Of InfoSec
Proffessionals & Responsible Disclosure Process
- Dr. Grigorios Fragkos
-
What Can Information Security
Learn From DevOps
- James McKinlay
-
Basic Malware Analysis:
Dispelling Malware FUD
- Ian Trump
-
Hunting Asynchronous Vulnerabilities
- James Kettle
-
Hooking The Linux Kernel
Without Getting Caught
- Gregory Fudge
-
Exploring & Exploiting
Video Game Security
- Elliot Ward
-
Enforcing Web Security And Privacy
With Zero-Knowledge Protocols
- Ignat Korchagin
-
Vehicle Cyber Security And
Innovative Advertising Campaigns
- Andy Davis
-
Exploiting P2P Protocols
For Fun And Profit
- Matthew Di Ferrante
-
50 Million Downloads
And All I Got Was Malware
- Andrew Pannell
-
Ensuring Password Cracking
Ain't Easy REDUX
- Michael Jack
-
12 Steps To An Affordable,
Effective Forensics Lab
- Oxana Sereda
-
Hacking The Mitsubishi Outlander:
A Lesson In Automotive IoT Security
- Ken Munro
-
Object Oriented Exploitation: New
Techniques In Windows Mitigation Bypass
- Sam Thomas
-
Flash It Baby!
- Soroush Dalili
-
Designing Systems To Be Hard To Attack
- Richard Crowther
-
CSP SRI STS PKP ETC OMG WTF BBQ
- Scott Helme
-
Three Laws Of Cyber.
Thou Shalt Not Pass!
- Dr. Daniel Dresner
-
Thanks, Comedy, Questions &
Closing Remarks
- BSides MCR Crew