Speakers |
Talk |
Video |
Slides |
Ken Westin |
Keynote: Every Contact Leaves a Trace |
|
|
Righard Zwienenberg |
ID.IOT or… The ID(ea) of IoT |
|
|
Tony Gee |
Getting In: Initial Access in 2023 |
|
|
Klaus Agnoletti |
I’m ok, you’re ok, we’re ok: Living with AD(H)D in infosec |
|
|
Yonatan Baum & Daniel Wolfman |
LAMBDA Malware: The Hidden Threat in Excel Spreadsheets |
|
|
Daniel Kapellmann Zafra |
Schrödinger’s Hack: Are Hacktivist Operations Placing Operational Technology at Risk? |
|
|
Cristian Cornea |
Bypassing Anti-Virus using BadUSB |
|
|
Alex Ilgayev |
Github Actions Security Landscape |
|
|
Miłosz Gaczkowski |
Sniffing keyboards (Turns out some of them stink) |
|
|
Chris Madden |
Understanding your vulnerability data to optimize your DevOps pipeline flow. |
|
|
Jake Sloane |
The Dark World of SMS Phishing Kits: An Insider's Perspective |
|
- |
Pablo Ramos |
Complexities of Vulnerability Management: Strategies for Prioritizing and Remediating Security Holes |
|
|
Daniel Oates-Lee & Simon Gurney |
Subdomain Hijacking - Why DevOps is making us more vulnerable |
|
|
Stuart Davis |
LightBasin: A Roaming Threat to Telecommunications Companies |
|
|
Rory McCune |
Containers for Pentesters |
|
|
Ivar Prudnikovas |
Signatures and receipts in the supply chain security |
|
|
Olgierd Pieczul |
Down the rabbit hole of 20-year long vulnerability |
|
|
Xavier Mertens |
Malware Analysis of the Poor |
|
|
Gadi Evron |
Locknote: Generative AI and ChatGPT Enterprise Risks |
|
|