SecuriTay 2018 May 18, 2018 to May 18, 2018, Dundee, Scotland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Incident Response in Your Pyjamas Paco Hope When security incidents happen, you often have to respond in a hurry to gather forensic ...
Internal security your developers won't hate Jonathan Hoyle Internal security systems are often cumbersome and difficult to use, leading to your developers not ...
So you have your degree- now what? Eamonn Keane In this presentation Eamonn highlights the growing transition from real to virtual, from dead to ...
Cloudy Cluster Catastrophe? About Rory Mccune "Cloud Native" computing has been a hot topic in the last 18 months with tech. ...
I Wrote my Own Ransomware; did not make 1 iota of a Bitcoin Thomas V Fischer 2016 saw a substantial rise in ransomware attacks and in some cases the return of ...
An Introduction To Binary Application Assessments Graham Sutherland Assessing binary applications (i.e. anything with an EXE, DLL, JAR, etc.) can be a challenging ...
Spear Phishing: from LinkedIn to logged in Alex Archondakis Spear phishing is on the rise, and the more our lives are displayed online, the ...
Probe-Req Sniffing on the Wemos IoT Platform Dr Ian Ferguson Mobile Wifi devices routinely emit probe-req packets giving details of the BSSIDs they have been ...
Diversity In InfoSec (not that sort!) About Victoria Walberg A talk in 2 parts.In Part 1 I'll use the OSI 7 Layer Model as ...
Analysing the Privacy of VPN's on iOS Jack Wilson Due to the increasing number of recommendations for people to use VPN's for privacy reasons, ...
I Thought I Saw a |-|4><0.- Thomas V Fischer Threat Hunting refers to proactively and iteratively searching through networks or datasets to detect and ...
Advancing Cyber Darren Martyn. This talk will discuss how we can leverage current/emerging techniques in infosec to advance our ...
Storing Secrets in DNS Oliver Leaver-smith DNS is great. DNS TXT records are greater. A quick run through of how I ...
Engineered Chaos: Breaking Prod and Getting Away With It Oliver Leaver-smith A talk around disaster recovery testing, chaos engineering, etc. and how we do this at ...
Profiling the attacker James Stevenson Profiling the attackerIt was once said "Intrusion analysis is as much about TCPdump as astronomy ...
Engineered Chaos: Vulnerability Anti-Pattern Tayyaba Nafees There is a distinct communication gap between the software engineering and cybersecurity communities when it ...
Ethical Social Engineering: Soft Skills for Workplace Success Mark Hunter Many technically-oriented degree programmes do an excellent job of providing students with a thorough grasp ...