-
Opening Remarks
- The Committee
-
Vulnerability Reporting In Open Source Software
- Andrew Thompson
-
IR DevSecOps (Or Incident Response By The Seat Of Your Pants)
- Alan Melia
-
A Practical Guide To Getting Security Right On AWS
- Jamie MacDonald
-
So You Want To Learn Red Teaming?
- Andy Gill
-
DOH! Bypassing DNS-over-HTTPS
- Sean Wright
-
Offensive Tradecraft - Defence Evasion
- Paul Laîné
-
Paper Tickets > Smartcards, Probably.
- Harley Watson
-
Confessions Of A Lock Collector (v2020_02 – Disc Detainer Edition)
- Steve "Autom8on" Wilson
-
OEMs HATE It! Get Paid To Backdoor Phones With This One Weird Trick!
- Ash Wolf
-
Predicting The Future Of Cryptojacking Through Data Fusion Application
- Sophia McCall
-
From Low To PWN: A CTF Challenge In The Wild
- Charlie Hosier
-
Saving User Data One Company At A Time - Hacking With Zseano
- Sean Roesner
-
Whodunnit? The Art Of Attribution In DFIR
- Morven MacKellar
-
Lightning Talks
- Lewis
-
Lightning Talks
- Tia Cotton
-
Nautical Nonsense
- Graham Sutherland
-
God Does Not Hate You, God Hates Your Computer
- Ian Thornton-Trump
-
Effective DDoS Attack Tracking
- Lloyd Davies
-
Risk Intelligence, Using The Intel Lifecycle For Real Results
- Michael Goedeker
-
Sunshine Through The Clouds: Successful Penetration Testing In Cloud Environments
- Paco Hope
-
Closing Remarks
- The Committee