• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2020
  • 2019
  • 2018
  • 2017
Edition logo

Securi-Tay 2022

2022-03-04
  • Thumbnail for the video - click to play

    ►

    Opening Remarks
    - The Committee
  • Thumbnail for the video - click to play

    ►

    The Art Of Fighting Bullies
    - Federico Charosky
  • Thumbnail for the video - click to play

    ►

    No More Alert(1)
    - Liam Follin
  • Thumbnail for the video - click to play

    ►

    Building A Security Program From The Ground Up
    - Jamie MacDonald
  • Video will not be published
    Social Engineering: How To Hack The Humans
    - Connor Duncan
  • Thumbnail for the video - click to play

    ►

    Docker? I Hardly Know Her! - Container Security 101
    - Mairi MacLeod
  • Thumbnail for the video - click to play

    ►

    Open Source Reverse Engineering: 60 Things In 60 Minutes
    - Grant Douglas
  • Thumbnail for the video - click to play

    ►

    Accidental Insider Threat Identification
    - Andy Gill
  • Video will not be published
    A Brief Overview Of Video Game Anti-cheat
    - Fraser.A
  • Thumbnail for the video - click to play

    ►

    Changing Career: From Teaching Students To Cybersecurity Student
    - Ewan Taylor
  • Thumbnail for the video - click to play

    ►

    I'm In Your Pipes, Stealing Your Secrets
    - Iain Smart
  • Video will not be published
    Practicing Safe Sex(t) - With Xxxtra Content
    - Tia C
  • Thumbnail for the video - click to play

    ►

    How We're Developing The Next Generation Of Vulnerability Researchers, And How The Lessons Learnt Can Be Applied To Your Own Training
    - James Stevenson
  • Thumbnail for the video - click to play

    ►

    The Continued Evolution Of Userland Linux Rootkits
    - Darren Martyn
  • Thumbnail for the video - click to play

    ►

    Microsoft Azure Sentinel, Log Analytics And Kusto Query Language - What A Security Analyst Does On A Daily Basis
    - Elizabeth Momola
  • Video will not be published
    Protecting Multi-Billion Pound Organisation
    - Kyle Bowes
  • Thumbnail for the video - click to play

    ►

    Finding Novel Forensic Artifacts
    - Joe Daniel
  • Thumbnail for the video - click to play

    ►

    An Exploration Into QR Codes And Their Prevalence As An Unexpected Phishing Vector
    - Josh Hill
  • Video will not be published
    Delusions Of Operational Security
    - Michael Jack
  • Thumbnail for the video - click to play

    ►

    Hacking 9 To 5; A Day In The Life Of...
    - Mark Rose
  • Thumbnail for the video - click to play

    ►

    Defensive Coding Reloaded: A Guide To Active Web Application Defence Responding To The Ever Evolving Threat Landscape
    - Don Smith
  • Thumbnail for the video - click to play

    ►

    Grok The Problem, Don't Let Security Be The Problem
    - Andrew Lee-Thorp
  • Thumbnail for the video - click to play

    ►

    Closing Remarks
    - The Committee