Star 0

Talks

Title Humans
Attacks on SAP HANA Platform Juan Perez-Etchegoyen
Saving Nostalgia: Modding an Old Z80 Computer Graham Sutherland
Advanced incident remediation techniques
Trusts you might have missed Will Schroeder
Data protection, privacy and cloud computing: navigating legal compliance
Not only frogs can hop Daniel Compton
Jittery MacGyver: Lessons Learned from Building a Bionic Hand out of a Coffee Maker Evan Booth
The Malware CAPE: Automated Extraction of Configuration and Payloads from Sophisticated Malware
What it Means to Have the C Word in the National Security Agenda Emil Tan
Bootstrapping an Architectural Research Platform Jacob Torrey
Light at the End of the Tunnel. (Hope for Team Defence) Haroon Meer
The Frugal Girl’s Guide to Threat Intelligence Rebekah Brown
Frictionless Security Jerry Gamblin
101 Ways To Brick Your Hardware Joe FitzPatrick
2016: The Infosec Crossroads Saumil Shah
Leverage One-shot UAF to a Minigun
Three decades in security. What’s changed, and what hasn’t. Robert Schifreen
Universal Serial aBUSe: Remote Physical Access Attacks Rogan Dawes