-
Opening
- SteelCon Organizers
-
Mastering Shadows: Blending [Offensive]
Intelligence With Adversarial Emulation
- Andy Gill
-
You Left The Back Door Open!
Finding Legacy Vulnerabilities In Legacy Systems
- Nick Dunn
-
Statistical Inconspicuousness
- Brandon Mcgrath & Michael Ranaldo
-
The Basics Of Social
Engineering - Part Deux
- Chris Pritchard
-
The Joy Of The False Positive:
Why You Should Share Your Failures
- Michelle D'israeli
-
Don't Hate The Player.... Hate The Game!!!!
- Alex Martin
-
HUNT
- Neil Lines
-
An Introduction To Code Compilation
- Tom Blue
-
Rise & Fall Of A CPU Zero-Day:
Inside Google’s Discovery & Remediation
Of A Critical CPU Vulnerability
- Yousif Hussin
-
A Brief History Of Time
- Tim Holman
-
We're Still So Serial!
- James Williams
-
Elevating Red Team Payloads
- Victor Van Der Helm & Dhruv Bisani
-
Wtf Is A Gateway?
Modern API Infrastructure For Hackers
- Katie Paxton-Fear
-
Doing Due Diligence
- James Bore
-
Tales Of DOMinica
- Liam Follin
-
Ragnarök:
When Threat Modelling Goes Wrong.
- Arron 'Finux' Finnon
-
Post-startup (security) Growing Pains
"Hi, It's Me, I'm The Risk"
- Maya Boeckh
-
AppSec For Devs:
The Good, The Bad And The Ugly
- Gerald Benischke
-
Closing
- SteelCon Organizers