Speakers |
Talk |
Video |
Slides |
Dr Grigorios Fragkos |
Keynote: Keynote: The CISO is dead; Long live the CCSO. |
|
|
Alexander Rubin |
MySQL server attacks YOU! (How we found CVE-2023-21980 in MySQL) |
|
|
Allyn Stott |
The Fault in Our Metrics: Rethinking How We Measure Detection & Response |
|
|
Chris Madden |
Understanding and Using Impact so you know what Vulnerabilities to fix first |
|
|
Sean Metcalf |
The Problem with Identity Security & How to Fix It |
|
|
Wietze Beukema |
Command-Line Obfuscation: You can run, _and_ you can hide |
|
|
Apostolos Giannakidis |
Identity at Risk: Identity-Centric Threat Modeling |
|
|
Yash Sancheti |
Mastering Privilege Escalation and SSRF in Penetration Testing |
|
|
Riccardo Ancarani & Devid Lana |
You Sh[e|a]ll not pass! Gentle Introduction to EDR Bypasses |
|
|
Pete G |
Unearthing the Secrets of 160 Year Old Railway |
|
|
Rory McCune |
Observability for pentesters |
|
|
Juho Jauhiainen |
I like to MOVEit MOVEit |
|
|
Adrian Sanchez Hernandez & Asli Koksal |
Demystifying APT42 Cyberoperations |
|
|
Chris Madden |
Exploit Prediction Scoring System (EPSS) - The User Guide |
|
|
David French |
From soup to nuts: Building a Detection-as-Code pipeline |
|
|
Alex Devassy |
Into the Abyss: Adversarial Tactics in AI Security |
|
|
Vangelis Stykas |
Locknote: Locknote: Beyond the Endpoint: My Adventures in API Security Research. |
|
|