Speakers |
Talk |
Video |
Slides |
Kevin Jones |
Keynote: Cyber Cluedo: Using Threat Intelligence to Defend & Respond to Cyber Threats) |
- |
|
Keith Hoodlet |
Security is a Feature |
|
|
Amit Vitekar |
Modemsploitation: An overview of security in cellular networks and modems |
|
|
Jan Carroll |
Bootstrapping your Cybersecurity Education |
|
|
Michelle Garrigan |
The Cyber-Physical Nexus: Interconnectivity Expands Smart Facility Attack Vectors |
- |
- |
Abi Waddell |
Radio Wave Open Source Intel using SDR |
|
|
Vangelis Stykas |
Charge my car for free! FOREVER! |
|
|
Stewart Hickey |
Cyber Resilience and the Future EU Cybersecurity certification framework |
- |
|
Darren Martyn |
The Continued Evolution of Userland Linux Rootkits |
|
|
Olgierd Pieczul |
Developer-centered security |
|
|
Paddy Kerley |
Cyber War Is Boring |
|
|
Karl Ots |
Lessons learned from enterprise cloud security programs |
|
|
Adrian McAlister |
Improving the Protection of the "Last Sunny Place on the Internet" aka TikTok |
|
|
Daniel Oates-Lee |
pwnSpoof |
|
|
Chaitra Bhat |
IAC (Infrastructure-As-Code) SAST - what’s that? |
|
|
Sam Stepanyan |
Using OWASP Nettacker For Recon and Vulnerability Scanning |
|
|
Thomas Fischer |
Threats versus Capabilities - Building Better Detect and Respond Capabilities |
|
|
Juho Jauhiainen |
Flubot - Pandemic in our pockets |
|
|
Stuart McMurray |
Does this thing actually work? |
|
|
Jayson E. Street |
Locknote: Perceptions: From a Blue Pill to a Blue & Black Dress |
|
|