Securi-Tay 2020 Feb. 28, 2020 to Feb. 28, 2020, Dundee, Scotland
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Vulnerability Reporting In Open Source Software | Andrew Thompson | Usage of open source is pervasive across every industry and is used by organizations of ... | |
IR DevSecOps (or Incident Response by the seat of your pants) | Alan Melia | The opportunity to work on an APT investigation is something few Incident Responders will have ... | |
A Practical Guide To Getting Security Right On AWS | Jamie Macdonald | There are news articles every week about exposed databases or public S3 buckets full of ... | |
So You Want to Learn Red Teaming? | Andy Gill | Red Teaming or Simulated Attacks, both used interchangeably are terms being thrown around a lot ... | |
DOH! Bypassing DNS-over-HTTPS | Sean Wright | DNS requests are submitted over an unencrypted channel. This has potential security and privacy related ... | |
Offensive Tradecraft - Defence Evasion | Paul Laîné | Over the last years, the cyber security posture of companies is improving, and, despite the ... | |
paper tickets > smartcards, probably. | Harley Watson | Following its adoption by the Department for Transport, the ITSO specification has been the legally ... | |
Steve “autom8on” Wilson | None | ||
OEMs HATE it! Get paid to backdoor phones with this One Weird Trick! | Ash Wolf | I found out the firmware updater on my new Android phone was pulling double-duty as ... | |
Mine your own business: Predicting the future of cryptojacking through data fusion application | Sophia Mccall | Wouldn't it be great if we could predict the future of cybercrime? In this talk ... | |
From Low to PWN: A CTF challenge in the wild | Charlie Hosier | Have you ever found that something you find in the real world has more resemblance ... | |
Saving user data one company at a time - Hacking with zseano | Sean Roesner | In this talk I will be discussing how I was easily able to identify numerous ... | |
Whodunnit? The Art of Attribution in DFIR | Morven Mackellar | The attribution of a person to a crime is a significant aspect of digital forensics ... | |
DumpTheGit | Malkit Singh | DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories. The ... | |
Practicing Safe Sex(t) | Tia Cotton | Nudes, Dirties, Pics, whatever you call them, you’ve probably sent them or know someone who ... | |
Nautical Nonsense | Graham Sutherland | Never thought you'd be on a boat? Me neither. Come explore the weird and wonderful ... | |
God Does Not Hate You, God Hates Your Computer | Ian Thornton-trump | It's unpleasant to even contemplate but global climate change will have massive impact on our ... | |
Densor - Effective DDoS attack tracking | Lloyd Davies | Densor is a distributed DDoS threat intel platform which gives parties access to DDoS attack ... | |
Risk Intelligence, Using the Intel Lifecycle for real results. | Michael Goedeker | This talk focuses on a new emerging way of moving past marketing terms like Threat ... | |
Sunshine Through the Clouds: Successful Penetration Testing in Cloud Environments | Paco Hope | Running world-class, scalable infrastructure in the cloud means deploying cloud-native security that is resilient, adaptive, ... |