-
A Hacker Walks Into A Co-Working Space
- Rahul Binjve
-
Andromeda - GUI Based Dynamic Instrumentation Toolkit Powered By Frida
- Shivang Desai
-
Welcome Note
- Antriksh Shah
-
Shack On The Beach
- Adam Laurie
-
The State Of Malware From The Eye Of The Tiger
- Martijn Grooten
-
Bug Hunters Methodology v3.0
- Jason Haddix
-
Cybersecurity And Privacy From The Global Lens
- Eva Galperin
-
Clash Of The Titans ; Who Will Survive?
- Panel discussion
-
PEW PEW PEW: Designing Secure Boot Securely
- Niek Timmers and Albert Spruyt
-
Pentesting Without Pentesters: Automating
Security Testing With Functional Testing Test Cases
- Lavakumar Kuppan and Ankita Gupta
-
Breached? – Here Is How I Responded!
- Panel discussion
-
Introducing The ASVS 4.0
- Andrew Van Der Stock
-
How To Use Bug Bounty To Start A Career In Silicon Valley
- Adam Ruddermann
-
The Windows Sandbox Paradox
- James Forshaw
-
Clear And Present Danger:
Cyber Wars Will Target Critical Infrastructure
- Panel discussion
-
Another Place, Another Time:
GPS Threats And Countermeasures
- Stephan Gerling
-
Getting To $10,000:
The Variables At Play In Determining Bounty Awards
- Jarek Stanley
-
Building An Intelligence Analysis
Systems Using Open Source Tools
- Fyodor Yarochkin
-
Cybersecurity: Is Machine Learning The Answer?
- Panel discussion
-
Unlocking iPhones On The Cheap
- Josheph Cox
-
Best Of Google VRP 2018
- Daniel Stelter-Gliese
-
LTE And IMSI Catchers: Then And Now
- Altaf Shaik and Ravi Borgaonkar
-
Hacker Horror Stories
- Various
-
A Monitoring Platform For Kubernetes Cluster Security
- Vincent Ruijter and Valentine Mairet
-
Bountycraft - The Panel
- Panel discussion
-
Interview With Robert Baptiste
- Antriksh Shah
-
Hacking Elections For Fun And Profit:
Disinformation And Cognitive Cyber Offence
- Panel discussion
-
Navigating Risk In The Changing
Business And Technology Landscape
- Panel discussion
-
Early Detection Of Malicious
Patterns In Event-Straming Data
- Hyrum Anderson
-
Security Alarm System:
Feeling Of Security Or Cause For Alarm?
- Kirils Solovjovs
-
Everything Is Quantum
- Jaya Baloo
-
The Myth Of Sisyphus Secure Product Development
- Panel discussion
-
Introduction To STIX/TAXII 2 Standards
- Allan Thomson
-
Fuzzing Embedded (Trusted)
Operating Systems Using AFL
- Martijn Bogaard
-
A Call To Arms
- Desi Jugaad
-
Actionable Intelligence And Cyber Security
- Panel discussion
-
How To Build Your Own Infosec Company:
An Ode To The Boutique, Not The Behemoth
- Mario Heiderich
-
Building Hardenend IoT Implementations With LangSec
- Prashant Anantharaman
-
Automatic Automotive Hacking
- Craig Smith
-
OT & IoT Risk Management Strategy For CISOs
- Panel discussion
-
Unlocking Secrets Of The Proxmark3 RDV4.0
- Kevin Barker
-
EDR Internals And Bypasses
- Christopher Vella
-
Legal & Policy Session
- AccessNow
-
Attacking And Securing HealthCare
Standards And Hospital Secured Systems
- Ajay Pratap Singh
-
Everybody's Changing And I Don't Feel The Same
- Dhillon Kannabhiran
-
Closing Ceremony
- Nullcon Crew