-
Welcome
- Alain Mowat
-
Crazy Incentives And How They
Drive Security Into No Man's Land
- Dr. Christian Folini
-
Breaking And Fixing Azure AD
Device Identity Security
- Dirk-jan Mollema
-
Targeted Social Engineering Attacks:
Weaponizing Psychology
- Christina Lekati
-
Turn And Face The Strange:
Ch-Ch-Changes In Ransomware Techniques
- Lindsay Kaye
-
A Ticket Worth
Waiting 65 Years For
- Charlie Bromberg
-
Hacking Harms! Measuring The
Impact And Harm From Cyberattacks
- Emma Raffray
-
Modern Adventures With Legacy Protocols
- Yannay Livneh
-
Inglourious Drivers:
The Revenge Of The Peripheral Devices
- Omer Tsarfati
-
Open Sésame!
Example Of Modern Electronic Lockpicking
- Thomas Bygodt
-
Pentesting By The Numbers:
What Data Analysis Tells About What We Do
- Charl Van Der Walt
-
USBvalve:
Expose USB Activity On The Fly
- Cesare Pizzi
-
Hacking Your Jump Rope
Or Your Coffee Machine
- Axelle Apvrille
-
Meet The Latest Innovations And Startups In
Cybersecurity & How To Become A Cyber Entrepreneur?
- Trust Valley Startups
-
How To Have Visibility And
Security OF CICD Ecosystem
- Pramod Rana
-
Cloud, IoT, Machine Learning: Which Models For Secure
ICS Network Architectures To Adapt To New Usages?
- Alexandrine Torrents
-
Permissionless Android
Universal Overlays
- Dimitrios Valsamaras
-
Attacking And Defending GraphQL:
The Ultimate Guide
- Leo Juszkiewicz
-
Welcome Day 2
- Alain Mowat
-
The Converging Threat Landscape
- Patrice Perche
-
Breaking Docker's
Named Pipes SYSTEMatically
- Eviatar Gerzi
-
The Snake Is In The Grass:
Finding Malicious PyPI Packages In The Wild
- Christophe Tafani-Dereeper And Vladimir De Turckheim
-
Secrets, Data And Cypher-injections:
Neo4j Attacks And Cloud Exploits
- Nitay Bachrach and Or Emanuel
-
You Click, You Lose: A Practical Look
At Visual Studio Code's Security
- Thomas Chauchefoin & Paul Gerste
-
Data Science And Machine Learning
In Cybersecurity: Hype Or Reality?
- Angelo Schranko De Oliveira
-
Optimising Business Value
With Secure Access Service Edge
- Neil Thacker
-
Whatever Pown2own
- Benoit Forgette & Damien Cauquil
-
Detection Engineering In
Modern Day Security Organization
- Tondang Mangatas and Sylvain Lu
-
Stories Of Money:
Crypto, Hacks, Ransom, DeFi And Attacks
- Marco Preuss
-
Cloud Disaster... As A Service
- Chris Hernandez
-
Adversary Tracking And All
The Lies We Tell Ourselves
- Joe Slowik
-
Use Case: Red Teaming
A Recently Breached Company
- Nuri And Marat
-
RCEing Your Way Into The Blockchain:
Uncovering A Critical Vulnerability And Taking
Over Decentralized Identity (DID) Networks
- Shaked Reiner
-
The History Of Ransomware:
From Floppies To Droppers, And Beyond
- Eliad Kimhy
-
Go Security Pitfalls: 2 Lessons
From The Battlefield At Grafana Labs
- Jeremy Matos
-
Why Kidz Couldn’t Care Less
About Your Password Advice?
- Mia Landsem