-
Opening Remarks
- Hack Glasgow Organizers
-
Hacking Things With AI Stuff
- Cary Hendricks
-
Why Did The Company Get Defrauded?
BECause...
- Mark Saunders
-
LLMs Under Siege: Navigating
Cybersecurity In Open-Source AI
- Victor Onyenagubom
-
A Dual Perspective On Cybercrime
- Calum Baird & James McGoldrick
-
Securing Values:
The Ethics Of Cyber Security
- Michael Whitehead
-
Enshittification Of The Industry
- Rosie Anderson
-
How To Get Away With Hacking
- Liam Follin
-
Attacking AWS: From Initial
Access To Hardcore Persistence
- Santi Abastante
-
Getting Started In Bug Bounty, From Picking A
Program To Getting Your First Report Triaged
- Lennaert Oudshoorn
-
Forensic Acquisition Of Soldered Storage
Laptops (And Others) Using Kali Linux
- Calum Baird
-
Yelling At The People And/Or
The Thinking Sand Isn't Helping
- Maya Boeckh
-
Terminal Velocity: Common
Command-Line Controls And Bypasses
- Andrew Finlayson
-
Blame The Parents
- James Bore
-
Phishing Kits vs Financial Institutions:
History, OSINT And Automation
- Tom Blue & Alana Witten
-
Femtech And Data Privacy: What’s At Stake?
- Arohi Naik
-
Geopolitics, Climate Change & Cyber: Why Nation
States Will Super Charge Espionage And Cyber Attacks
- Ian Thornton-Trump
-
Closing Remarks
- Hack Glasgow Organizers