Securi-Tay 2020 Feb. 28, 2020 to Feb. 28, 2020, Dundee, Scotland

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Vulnerability Reporting In Open Source Software Andrew Thompson Usage of open source is pervasive across every industry and is used by organizations of ...
IR DevSecOps (or Incident Response by the seat of your pants) Alan Melia The opportunity to work on an APT investigation is something few Incident Responders will have ...
A Practical Guide To Getting Security Right On AWS Jamie Macdonald There are news articles every week about exposed databases or public S3 buckets full of ...
So You Want to Learn Red Teaming? Andy Gill Red Teaming or Simulated Attacks, both used interchangeably are terms being thrown around a lot ...
DOH! Bypassing DNS-over-HTTPS Sean Wright DNS requests are submitted over an unencrypted channel. This has potential security and privacy related ...
Offensive Tradecraft - Defence Evasion Paul Laîné Over the last years, the cyber security posture of companies is improving, and, despite the ...
paper tickets > smartcards, probably. Harley Watson Following its adoption by the Department for Transport, the ITSO specification has been the legally ...
Steve “autom8on” Wilson None
OEMs HATE it! Get paid to backdoor phones with this One Weird Trick! Ash Wolf I found out the firmware updater on my new Android phone was pulling double-duty as ...
Mine your own business: Predicting the future of cryptojacking through data fusion application Sophia Mccall Wouldn't it be great if we could predict the future of cybercrime? In this talk ...
From Low to PWN: A CTF challenge in the wild Charlie Hosier Have you ever found that something you find in the real world has more resemblance ...
Saving user data one company at a time - Hacking with zseano Sean Roesner In this talk I will be discussing how I was easily able to identify numerous ...
Whodunnit? The Art of Attribution in DFIR Morven Mackellar The attribution of a person to a crime is a significant aspect of digital forensics ...
DumpTheGit Malkit Singh DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories. The ...
Practicing Safe Sex(t) Tia Cotton Nudes, Dirties, Pics, whatever you call them, you’ve probably sent them or know someone who ...
Nautical Nonsense Graham Sutherland Never thought you'd be on a boat? Me neither. Come explore the weird and wonderful ...
God Does Not Hate You, God Hates Your Computer Ian Thornton-trump It's unpleasant to even contemplate but global climate change will have massive impact on our ...
Densor - Effective DDoS attack tracking Lloyd Davies Densor is a distributed DDoS threat intel platform which gives parties access to DDoS attack ...
Risk Intelligence, Using the Intel Lifecycle for real results. Michael Goedeker This talk focuses on a new emerging way of moving past marketing terms like Threat ...
Sunshine Through the Clouds: Successful Penetration Testing in Cloud Environments Paco Hope Running world-class, scalable infrastructure in the cloud means deploying cloud-native security that is resilient, adaptive, ...