Registration 8:00am - 8:45am
Coffee Break 11:00am - 11:30am
Lunch 12:30pm - 1:30pm
Break
Closing Remarks
Opening Remarks
HTTP Desync Attacks: Smashing into the Cell Next Door 9:00am - 10:00am
Quantum Computers and Cryptography 10:00am - 11:00am
Getting Splunky with Lateral Movement - Attack, Detect and Evade 11:30am - 12:30pm
The perfect place for a backdoor (VM Hub 3.0) 1:30pm - 2:30pm
Protecting Kids Online: Are We Doing Enough 2:30pm - 3:30pm
Crash, Burn, Report 3:45pm - 4:45pm
Fun with Frida! 4:45pm - 5:45pm
Fe-fi-fo-FIM, I smell the monitoring of an elastic stack! 9:00am - 10:00am
Navigating the Red Forest 10:00am - 11:00am
a8n-retrospective/introspective : a minor exercise in ego... 11:30am - 12:30pm
Exposing AWS with flAWS 1:30pm - 2:00pm
Offensive Development: How to De... 2:00pm - 2:30pm
What colour is your hat? 2:30pm - 3:30pm
I like big bots 3:45pm - 4:45pm
Losing Battles but Winning Wars 4:45pm - 5:45pm
Hacking RF: Breaking what We Can’t See 10:00am - 11:00am
osint + python: extracting information from tor network and dark... 11:30am - 12:30pm
Threat Modelling and Black Swans... 1:30pm - 2:00pm
Profiling The Attacker | Using N... 2:00pm - 2:30pm
S-a-a-a-S – Security as an actual service 2:30pm - 3:30pm
Rage Against The FUD 3:45pm - 4:45pm
From builder to breaker 9:00am - 9:30am
Increasing Security: New Recruit... 9:30am - 10:00am
Introduction to OWASP Juice shop 10:00am - 10:30am
Phishing Overboard 10:30am - 11:00am
Metadata piggybacking: A look in... 11:30am - 12:00pm
Malicious Behavior Detection usi... 12:00pm - 12:30pm
1 year on, It's not all about GD... 1:30pm - 2:00pm
Nice vulnerability, I don't care 2:00pm - 2:30pm
Making a Subset difference: The... 2:30pm - 3:00pm
Do I need to change the OSS in m... 3:00pm - 3:30pm
Coding Burp Extensions 1:30pm - 3:30pm
BadUSB 3:45pm - 5:45pm