Title |
Speakers |
Summary |
Topic Types |
Opening Remarks |
Thomas Fischer
|
N/A |
|
[Keynote] Freaky Leaks from a Chic Geek |
Chris Kubecka
|
Subtitle: I should buy a boat Leakware, leaked data bases and leaky applications. Leaks are ... |
|
Introduction and Kick Off |
Craig Jones
|
N/A |
|
Introducing Pi-Key: Hacking just like the Movies |
Jon Aubrey
,
Trevor Shingles
|
Have you ever watched a film where the actor attaches a 'hacking device' to something, ... |
|
Connecting the dots! |
Arron "finux" Finnon
|
We've seen in 2016 the datapocalypse of 3rd party data breaches, with conservative estimates reaching ... |
|
Session 1 Dynamic Stink Lie Berry's with John Carroll @n0x00 |
John Carroll
|
Want to know how to identify DLL pre-loading attacks but feel like you aren't geeky ... |
|
Session 1 Web Hacking 101 with Porthunter @porthunter |
Porthunter
|
We will cover all the basics to give you a good head start into the ... |
|
Session 1 Saving time and effort with security tools and solutions on the BSDs with Sevan Janiyan @sevanjaniyan |
Sevan Janiyan
|
An quick introductory tour of some of the features in the BSD family of UNIX ... |
|
Targeted CV writing when entering or changing fields |
David Chismon
|
Getting the first Job in a new field can be hard, particularly if there is ... |
|
How the f**k do I get in? One woman's struggle to break into cyber security! |
Colette Weston
|
N/A |
|
Profiling Malicious Actors (Working Title) |
James Stevenson
|
N/A |
|
Awareness about behavior online, how to build it |
Jelena Milosevic
|
N/A |
|
Working with a recruiter: Mythbuster. What a ‘good’ recruiter does |
Ryan King
,
James Spear
|
How to engage and work with a recruiter. Why use a recruiter? CERIS. Trust goes ... |
|
WiFi-based IMSI Catcher |
Piers O'hanlon
|
We present a new WiFi-based IMSI catcher which operates by exploiting flaws in the way ... |
|
[NOT FILMED] How storytelling made me a better infosec professional |
Javvad Malik
|
Lights, camera, action… just three words can conjure up images, build anticipation, and set the ... |
|
Session 2 Red Teaming with PoshC2 with Ben Turner & Phil Lynch ( @benpturner & @plynch98 ) |
Ben Turner
|
This workshop is aimed to help people get setup and start attacking client devices (using ... |
|
Think about the box |
Stefan Hager
|
N/A |
|
Security Monitoring: Avoiding 'Oh Sh*t' Moments |
Pete Bryan
|
N/A |
|
Needle in a haystack: Tips and tricks to get you noticed by us. |
Craig Jones
,
Randall Otto
|
Ever wanted to work at a vendor? Seen that awesome security job? We’ll tell you ... |
|
Secure Communications |
Zoë Rose
|
When users and clients ask for 'secure communications' they often get excited about shinny new ... |
|
Sharing is not caring: Proliferation of GitHub code in real attacks |
Christopher Doman
|
What happens when attackers deploy open-source malware Looking at open command and control servers to ... |
|
Droid Reversal for 'Civilians |
Giles Greenway
|
N/A |
|
Breakout - Ask the expert panel, open questions here |
David Chismon
,
Ryan King
,
James Spear
,
Randall Otto
|
N/A |
|
Session 2 Making Infosec YouTube Videos with Javvad Malik @J4vv4D and Leigh-Anne Galloway |
Javvad Malik
,
Leigh-anne Galloway
|
If you've considered making YouTube videos to compliment your blogging, or just want to learn ... |
|
Session 2 From zero to hero with Scott Helme @Scott_Helme |
Scott Helme
|
In this workshop each delegate will be assigned their own virtual server with a website ... |
|
IPv6 for Pentesters |
Owen Shearing
|
N/A |
|
Session 3 Malware Funalysis: Networking (mostly) with PATH |
Path
|
Diving right into the traffic of some pretty hairy current malware, mostly focussing on recent ... |
|
[NOT FILMED] Alexa's top 1M domains - the state of web insecurity 2017 |
Porthunter
|
1M top Alexa site, how secure are they? Join me as we explore my research ... |
|
Holy smokes, how to vape yourself to root |
Ross ‘shodan’ Bevington
|
We all know that smoking is bad for your health, but what about your network? ... |
|
The state of crypto APIs |
Nick Smith
|
N/A |
|
Session 3 Leveraging Global Datasets to Improve Your Cyber Investigations with Jeff Lenton @RiskIQ |
Jeff Lenton
|
Limited Capacity full Adding this to your schedule will put you on the waitlist. While ... |
|
Session 4 Breaking Apps with Frida with Jahmel Harris @JayHarris_Sec |
Jahmel Harris
|
Frida is a magical piece of software that can inject JavaScript into running applications. This ... |
|
Session 3 Introduction to Logical Windows Privilege Escalation with James Foreshaw @tiraniddo |
James Foreshaw
|
More and more code running on Windows is done inside sandboxes or as non-administrators. This ... |
|
Brazilian Bandits: Cybercrime in Brazil |
Annabel Jamieson
|
N/A |
|
Enemies of the West |
Neil Lines
|
On November 24, 2014, "Guardians of Peace" (GOP) released confidential data from the film studio ... |
|
Hunt Or Be Hunted |
Alex davies
|
Over the last few years threat hunting has risen from being a grassroots hands-on defensive ... |
|
Malware Analysis 101 |
Andrew Costis
|
N/A |
|
Ignorance is bliss - does privacy matter? |
Andi Hudson
|
N/A |
|
Whodunnit: The art of attribution |
Abel Toro
|
N/A |
|
Panning for Coin: Small-time Currency Mining Botnets (Working Title) |
Luke Somerville
|
N/A |
|
A look at TR-06FAIL and other CPE Configuration Disasters |
Darren Martyn
|
In late 2016 a TR-064 (LAN-side CPE management) misconfiguration in a wide range of CPE ... |
|
Truly Anonymous Credentials Using Modern Cryptography |
Matthew Di Ferrante
|
When using anonymous networks like Tor or I2P, one problem is always how to prevent ... |
|
The use of SMT solvers in IT security |
Thaís
|
N/A |
|
Running Circles On Social Media - Intelligent OSINT |
Jack
|
N/A |
|