-
Opening Remarks
- The Committee
-
The Art Of Fighting Bullies
- Federico Charosky
-
No More Alert(1)
- Liam Follin
-
Building A Security Program From The Ground Up
- Jamie MacDonald
-
Social Engineering: How To Hack The Humans
- Connor Duncan
-
Docker? I Hardly Know Her! - Container Security 101
- Mairi MacLeod
-
Open Source Reverse Engineering:
60 Things In 60 Minutes
- Grant Douglas
-
Accidental Insider Threat Identification
- Andy Gill
-
A Brief Overview Of Video Game Anti-cheat
- Fraser.A
-
Changing Career:
From Teaching Students To Cybersecurity Student
- Ewan Taylor
-
I'm In Your Pipes, Stealing Your Secrets
- Iain Smart
-
Practicing Safe Sex(t) - With Xxxtra Content
- Tia C
-
How We're Developing The Next Generation Of Vulnerability Researchers,
And How The Lessons Learnt Can Be Applied To Your Own Training
- James Stevenson
-
The Continued Evolution Of Userland Linux Rootkits
- Darren Martyn
-
Microsoft Azure Sentinel, Log Analytics And Kusto Query
Language - What A Security Analyst Does On A Daily Basis
- Elizabeth Momola
-
Protecting Multi-Billion Pound Organisation
- Kyle Bowes
-
Finding Novel Forensic Artifacts
- Joe Daniel
-
An Exploration Into QR Codes And Their
Prevalence As An Unexpected Phishing Vector
- Josh Hill
-
Delusions Of Operational Security
- Michael Jack
-
Hacking 9 To 5; A Day In The Life Of...
- Mark Rose
-
Defensive Coding Reloaded:
A Guide To Active Web Application Defence
Responding To The Ever Evolving Threat Landscape
- Don Smith
-
Grok The Problem, Don't Let Security Be The Problem
- Andrew Lee-Thorp
-
Closing Remarks
- The Committee