Speakers
Speakers | Talk |
Dave Lewis | Keynote |
Dr Grigorios Fragkos | Cyber Security in evolutionary terms (food-for-thought) |
Mick Ryan | SOAR - Practical Implementation Advice |
Michael Burke | Forensics in the blink of an i(OS) |
Nicolas Mattiocco | PatrOwl - SecOps Automation and Orchestration |
Guillaume Lopes | Abusing Google Play Billing for fun and unlimited credits! |
Tom Owen | Thriving in cybersec - Creating resilience in the Fleshy Orchestration Layer |
Barbara Bogdanescu | DevSecOps - How Enterprise can stop fearing change and embrace automation |
Christina Lekati & Tigran Terpandjian | Red CHIMAERA: A novel Red Team model |
Jelena Milosevic | Security isn't just a tech issue, but much more ... #healthcare |
Jacob Baines | BadUSB in Routers |
Ivica Stipovic | Armouring reverse_tcp to bypass antivirus |
Binh Thanh Le, Cian Young & Niall McGrath | A master security monitoring tool -SecMonSter |
Anton Black | What does it take to run a bug bounty? |
Owen Pendlebury | How Developers Can be More Proactive about the OWASP Top 10 |
Shahidul Hoque | Threat Modelling: The Secret Sauce of an Effective Secure Software Development Life Cycle Programme |
Dean O'Neill | Open Source Spying - Breaking OPSEC for Fun and Profit |
Francis Long | Are Boarding Passes Secure |
Gavin O'Gorman | Opsec failures, or How Not to Get Caught |
Jean Marie Bourbon | A Post-Exploitation tale...in real life |
Thomas Fischer | Data Protection Focused IR |
Presentation Slides
Threat Modelling: The Secret Sauce of an Effective Secure Software Development Life Cycle Programme
Shahidul Hoque
Sponsors
Sponsor | Tier |
Symantec | Platinum |
Tines | Gold |
Gold | |
edgescan | Silver |
Amazon | Silver |
Integrity360 | Silver |
BH Consulting | Bronze |
f5 | Bronze |
tenable | Bronze |
Sentinel GRC | Bronze |
YesWeHack | Afterparty |