-
Opening Remarks
- The Committee
-
Enter The Dragon: A Look At Geopolitical Challenges?
And A Look To The Future Of Cyber And Finance!
- James Kwaan
-
Who's Really In Your Inbox?
Decoding Business Email Compromise
- Michael Varley
-
Explaining ICS To A Fool Of A Took
- Jenny Highfield
-
InfoStealerz: The Phantom Menace
- Dónnan Mallon
-
Discussion For Securing Data Exchange
With Zero Knowledge Proofs
- Cameron Finlay
-
Love, Sex And Robots: The New Frontier
Of Intimacy And Abuse Online
- Tia C
-
From Underground POC, To Exploited CVE:
The Adversarial Pathway To Successful Exploitation
- Hamish Maguire
-
Secure Coding: Integrating AI
Securely Into Software Workflows
- Helen Oluyemi
-
Chaos Engineering: Running Effective
Gamedays To Build System Resilience
- Tai Huynh
-
Think Like An Adversary:
Using The Red Team Mindset To Help Blue
- Andy Gill
-
Threat Landscape Diversification
Amidst Regulatory Disruption
- Allena Matheson-Dear
-
Picture This - Using SVG For Initial Access
- Zack Anderson
-
Jackpotting An ATM
- Derek Henderson & Aldrin Baretto
-
Leveraging AI For Deeper Malware Analysis
- Thomas MacKinnon
-
A Trivial Bug In A Complicated Camera
- Ben R
-
10 Years On - From Abertay To Google
Career Talk
- Blair Fyffe
-
The Rising Tide Of OT-Focused
Cyberattacks In An Era Of Cyberwarfare
- Nithika Senaweera
-
Bumblebee A Sting In The Tail!
- Nick Leitch
-
SaaS-Tainable Security:
Finding Balance In A Kubernetes World
- Hannah Nairn
-
I Want To Cry: A History Of Malware
- Jack Laundon
-
Side-Channel Attacks
On Physical User Input
- Darren Fürst
-
Finding Your Attack Path
Into The Security Industry
- Miłosz Gaczkowski & Mohit Gupta
-
Closing Remarks
- The Committee