Title |
Speakers |
Summary |
Topic Types |
Three Decades In Security. What's Changed, And What Hasn't |
Robert Schifreen
|
N/A |
|
Frictionless Security |
Jerry Gamblin
|
N/A |
|
Light at the end of the tunnel. (Hope for team Defence) |
Haroon Meer
|
N/A |
|
What it means to have the C word in the National Security agenda |
Emil Tan
|
N/A |
|
Not only frogs can hop |
Daniel Compton
|
N/A |
|
Vehicle Cyber Security and innovative assessment techniques |
Andy Davis
,
David Clare
|
N/A |
|
ARM Shellcode Basics |
Saumil Udayan Shah
|
N/A |
|
Jittery MacGyver: Lessons Learned from Building a Bionic Hand out of a Coffee Maker |
Evan "treefort" Booth
|
N/A |
|
Attacks on SAP HANA platform |
Juan Perez-etchegoyen
,
Nahuel Sanchez
|
N/A |
|
Web application Firewalls: Advanced analysis of detection logic |
Vladimir Ivanov
|
N/A |
|
Managing Incidents with CyberCPR |
Steve Armstrong
|
N/A |
|
The Frugal Girl’s Guide to Threat Intelligence |
Rebekah Brown
|
N/A |
|
Leverage One-shot UAF to a Minigun |
G Wen
|
N/A |
|
IMSecure - Attacking VoLTE |
Hendrik Schmidt
,
Brian Butterly
|
N/A |
|
2016: The Infosec Crossroads |
Saumil Udayan Shah
|
N/A |
|
Effortless, Agentless Breach Detection in the Enterprise: Token all the Things! |
Azhar Desai
,
Nicholas Rohrbeck
|
N/A |
|
Evening Session: Graham Sutherland - Saving Nostalgia: Modding an old Z80 computer |
Graham Sutherland
|
N/A |
|
Evening Session: Rogan Dawes & Dominic White - Universal Serial aBUSe: Remote physical access attacks |
Dominic White
,
Rogan Dawes
|
N/A |
|
Data protection, privacy and cloud computing: navigating legal compliance |
Graham Mckay
|
N/A |
|
Advanced Incident Remediation Techniques |
Steve Armstrong
|
N/A |
|
Bootstrapping an Architectural Research Platform |
Jacob Torrey
|
N/A |
|
Look Mum, I don't use Shellcode: Browser Exploitation Case Study for Internet Explorer 11 |
Moritz Jodeit
|
N/A |
|
Hunting Linux Malware for Fun and $flags |
Olivier Bilodeau
,
M. M. Léveillé
|
N/A |
|
101 ways to brick your hardware |
Joe Fitzpatrick
|
N/A |
|
The Malware CAPE: Automated Extraction of Configuration and Payloads from Sophisticated Malware |
Kevin O’reilly
|
N/A |
|
Exploiting COF vulnerabilities in the Linux kernel |
Vitaly Nikolenko
|
N/A |
|
Advanced Java Application Code Review |
Philippe Arteau
|
N/A |
|
Trusts You Might Have Missed |
Will Schroeder
|
N/A |
|