-
Opening Remarks
- Mark Carney
-
F**k You, FUD
- Jessica Barker and Freakyclown
-
Security OAuth 2.0
- Jonathon Brookfield and Fraser Winterborn
-
Working With Risk (Or How I Learned To Stop
Worrying And Connect Things To The Internet)
- Chris Ratcliff
-
Prototyping And Reverse
Engineering With Frida
- Jay Harris
-
Clustering Of Web Attacks:
A Walk Outside The Lab
- Galid Yehudai
-
Pentesting Hardware And IoT
- Mark Carney
-
Hacker Of All Trades
Master Of None
- Andy Gill
-
Passive-ish Recon Techniques
- Tom Hudson
-
Stories From The
Cybercrime Battlefield
- Ian Thornton-Trump
-
Bypassing CRP On Microcontrollers
- Andrew Tierney
-
Plumbers Vs. Rockstars
- Victoria Walberg
-
Performing JavaScript
Static Analysis
- Lewis Ardern
-
Night Of The Living Dead Pentest
- Rory McCune
-
Soldier To Cyber
- Phill Kimpton
-
All You Need Is Pi
- David Lodge
-
How The Hell Did I End Up In Infosec?
- Victoria Walberg,Matt Hall and Steve Davies
-
Closing Remarks
- Mark Carney