-
Opening Remarks
- Abertay Ethical Hacking Society
-
Incident Response In Your Pyjamas
- Paco Hope
-
Internal Security Your
Developers Won't Hate
- Jonathan Kingsley and Jamie Hoyle
-
So You Have Your Degree - Now What?
- Eamonn Keane and Gerry Grant
-
Cloudy Cluster Catastrophe?
- Rory McCune
-
I Wrote My Own Ransomware
Did Not Make 1 Iota Of A Bitcoin
- Thomas V Fischer
-
An Introduction To Binary
Application Assessments
- Graham Sutherland
-
Spear Phishing: From LinkedIn To Logged In
- Alex Archondakis
-
Probe-Req Sniffing On
The Wemos IoT Platform
- Ian Ferguson
-
Diversity In InfoSec (Not That Sort!)
- Victoria Walberg
-
Analysing the Privacy of VPN's on iOS
- Jack Wilson
-
I Thought I Saw A |-|4><0.-
- Thomas V Fischer
-
Advancing Cyber
- Darren Martyn
-
Closing Remarks
- Abertay Ethical Hacking Society
-
Storing Secrets in DNS
- Oliver Leaver-Smith
-
Engineered Chaos: Breaking Prod And Getting Away With It
- Oliver Leaver-Smith
-
Profiling the attacker
- James Stevenson
-
Vulnerability Anti-Pattern
- Tayyaba Nafees
-
Ethical Social Engineering: Soft Skills For Workplace Success
- Mark Hunter
-
Peekaboo AV: OpenSource 2018 AntiVirus
- Felix
-
Pen-testing In Persia
- Mohammad Ebrahimi