-
Everybody's At It But Why Aren't We?
- Raj Samani
-
War Games: Testing Your Threat Hunting, Cyber Threat Intelligence And Incident Response Process And Procedures
- Mike Johnson
-
Why Pen Testing Is The Last Thing You Should Do
- James Bore
-
Making Security Everybody's Job......Like A Boss
- Akolade "Kay" Adelaja
-
Subdomain Takeovers
- Simon Gurney
-
Building A Robot For (Complete) Beginners
- Mark Goodwin
-
ShoDAN, Featuring Lisa Forte
- Lisa Forte,Dan Card and Dan Conn
-
Understanding Vulnerability Data
- Jerry Gamblin
-
Overclocking Your Sunflowers
- Cyber_Coo
-
Your Red Team Is Missing The Point
- Zibby Kwecka
-
Lessons Security Systems Architecture Need To Learn From The Nuclear Industry
- Rick Trotter
-
MFA - A Golden Attack Vector
- Parth Shukla
-
Tin Foil Hat Competition
- BSides NCL Team
-
Will Ransomware Eventually Run Somewhere?
- Jordan Glover
-
Resistance Is Futile, We Are All Borg
- Len Noe
-
Revenge Is Best Served Over IoT
- Chris Kubecka
-
Recruitment Hacks From The Dark (Agency) Side
- Rosie Anderson
-
Zero To AppSec Hero: Software Security From Scratch
- Mark Goodwin
-
Exploit Prediction Scoring System (SPSS)
- Jerry Gamblin
-
Don't turn your back on Ransonware
- Erik Heskes
-
A Grad Story: What You May Experience In Your First Role
- Callum Lake
-
Oh, You ARE Talking To Me!
- Anne Turner
-
KSEC Biohacking (no Sound)
- Kai
-
Linux Network Defence Evasion Techniques
- Aqeeb Husain
-
DeceptionOps: Automating Deception Tech
- Andrew Waite
-
Cyber Influencer Influenza?
- Infosteph,CyberWarrior and Scott McGready
-
Closing
- BSides NCL Team