SecuriTayDundee 2019 March 1, 2019 to March 1, 2019, Dundee, Scotland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Software Security: Never Stop Evolving Nick Murison From the early days of software bugs through to the modern day, software security practitioners ...
We take your security seriously. Or do we? Ian Thompson In this talk, we discuss the lengths some organisations go to, in order to protect ...
Beyond Windows Forensics with Built-in Microsoft Tooling Thomas V Fischer Microsoft has slowly been introducing tools to help organisations better manage and troubleshoot Windows performance ...
Lightning Talk 1: Obfuscating PDF Malware: How I “nearly” created a FUD Jonathan Ross Everyone and their dog is aware of macro based malware nowadays, but not all know ...
Talk 2: GPU Accelerated Security Andrew Calder Since the introduction of general purpose graphics processing units, many trivially scalable tasks have benefitted ...
7 Hardware Hacks for 7GBP Joe Fitzpatrick We may live in a software world, but all that software runs on hardware at ...
RATs, Crypters & Zombies: A History of Consumer Malware Dan Nash Malware has become one of the most prevalent threats to personal computer security: how did ...
Lightning Talk 1: Profiling The Attacker - Using natural language processing to predict crime James Stevenson What does Minority Report, Black Mirror, and 1984 all have in common?.. Well, turn up ...
Lightning Talk 2: Using Natural Language Processing Techniques to Crack Passwords Robin Vickery A custom dictionary that exploits the shared social experience of a userbase can be interactively ...
Ridiculous Radios Dominic Spill There are many Software Defined Radios (SDRs) available, with a great deal of time and ...
Physical Security Games: Lessons Learnt Building CTF Challenges for Hackers Steve Wilson In the past, I've built a number of challenges for a variety of events. I've ...
Striking While the Iron's Hot - The do’s and dont's for getting a job in infosec James Stevenson , Brett Calderbank , Chlöe Ungar , Daniel Wilson What’s a job in infosec really like? In fact how do you even get one ...
Hardware Isn't Hard Graham Sutherland With the advent of IoT connected everything - doorbells, dishwashers, ovens, alarms, and uh... more ...
Mobile Application Hardening: Protecting Business Critical Apps Grant Cucakovic Mobile application security isn't always super exciting or challenging but when it comes to application ...
Lightning Talk 1: From Breaking In to Breaking Through: the applicability of skills from social engineering to teaching security behaviours Rose Regina Lawrence What isn’t there to love about talking your way into places you’re not allowed, free ...
Lightning Talk 2: Intro to Machine Learning for Hackers Helena Lucas As cyber security students & professionals, do we really need to care about Machine Learning? ...
Where 2 Worlds Collide: Bringing Mimikatz et al to UNIX Tim Wadhwa-brown Over the past fifteen years there's been an uptick in "interesting" UNIX infrastructures being integrated ...
Weaponising Layer-8 Stefan Hager Do you think users are the weakest link in the security chain? Here is some ...
Lightning Talk 1: It might get loud! Exfiltrating data using audio interfaces Miguel Marques Data exfiltrating is often the final and most important phases of an attack as this ...
Lightning Talk 2: Back to School: Bringing it Back to the Students Carran Garratley This talk will discuss tools, tricks and stories from students on how to advance yourself ...
Closing Keynote: ISIS Online: Junaid Hussain Mikey Jack This talk examines the online tactics of Junaid Hussain (Aka TriCk) as a hacktavist and ...