• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2023
  • 2022
  • 2019
Edition logo

Le Tour Du Hack 2019

2019-03-23
  • Thumbnail for the video - click to play

    ►

    Opening Remarks
    - LTDH Team
  • Video will not be published
    Keynote
    - Stu Peck
  • Thumbnail for the video - click to play

    ►

    We Take Your Security Seriously... Or Do We?
    - The Beer Farmers
  • Thumbnail for the video - click to play

    ►

    Intro To Machine Learning For Hackers
    - Helena Lucas
  • Thumbnail for the video - click to play

    ►

    Evolving The Use Of Your SIEM To Hunt And Adapt Through OODA (Observe, Orient, Decide, Act)
    - Harry McLaren
  • Thumbnail for the video - click to play

    ►

    Red Teaming On A Shoestring
    - James Hickie
  • Thumbnail for the video - click to play

    ►

    The Spy In Your Home Analysing The "Security" Of A Security Camera
    - Clemens Krueger
  • Video will not be published
    Hacking The Largest Machine In The World: Phone Phreaking
    - Doug Carson
  • Thumbnail for the video - click to play

    ►

    Why Are Users S* At Security
    - Rebecca Liddle
  • Thumbnail for the video - click to play

    ►

    Windows Detection Engineering With ELK
    - Dan Nash
  • Thumbnail for the video - click to play

    ►

    The Privacy And Transparency Of Data Ownership
    - Nishan Chelvachandran & Stefan Kendzierskyj
  • Thumbnail for the video - click to play

    ►

    A QuickLook At MacOS Thumbnails
    - Kinga Kieczkowska
  • Thumbnail for the video - click to play

    ►

    Using Reduced File Representations To Facilitate Fast Contraband Detection
    - Sean McKeown
  • Video will not be published
    A Security Person's Life, Or "The Art Of Being Cassandra"
    - Rory McCune
  • Thumbnail for the video - click to play

    ►

    Analysis Of The "10 Billion" Aka Collection #1 Password Leak
    - Kirils Solovjovs
  • Thumbnail for the video - click to play

    ►

    The Good, The Bad And The Ugly Of Responsible Disclosure
    - Chrissy Morgan
  • Thumbnail for the video - click to play

    ►

    Polymorphic Attack Vectors And Behavioural Detection: A Tale Of A New Computer War
    - Stefano Sesia
  • Video will not be published
    Closing Remarks
    - LTDH Team