Speakers
| Speakers | Talk |
| Dave Lewis | Keynote |
| Dr Grigorios Fragkos | Cyber Security in evolutionary terms (food-for-thought) |
| Mick Ryan | SOAR - Practical Implementation Advice |
| Michael Burke | Forensics in the blink of an i(OS) |
| Nicolas Mattiocco | PatrOwl - SecOps Automation and Orchestration |
| Guillaume Lopes | Abusing Google Play Billing for fun and unlimited credits! |
| Tom Owen | Thriving in cybersec - Creating resilience in the Fleshy Orchestration Layer |
| Barbara Bogdanescu | DevSecOps - How Enterprise can stop fearing change and embrace automation |
| Christina Lekati & Tigran Terpandjian | Red CHIMAERA: A novel Red Team model |
| Jelena Milosevic | Security isn't just a tech issue, but much more ... #healthcare |
| Jacob Baines | BadUSB in Routers |
| Ivica Stipovic | Armouring reverse_tcp to bypass antivirus |
| Binh Thanh Le, Cian Young & Niall McGrath | A master security monitoring tool -SecMonSter |
| Anton Black | What does it take to run a bug bounty? |
| Owen Pendlebury | How Developers Can be More Proactive about the OWASP Top 10 |
| Shahidul Hoque | Threat Modelling: The Secret Sauce of an Effective Secure Software Development Life Cycle Programme |
| Dean O'Neill | Open Source Spying - Breaking OPSEC for Fun and Profit |
| Francis Long | Are Boarding Passes Secure |
| Gavin O'Gorman | Opsec failures, or How Not to Get Caught |
| Jean Marie Bourbon | A Post-Exploitation tale...in real life |
| Thomas Fischer | Data Protection Focused IR |
Presentation Slides
Threat Modelling: The Secret Sauce of an Effective Secure Software Development Life Cycle Programme
Shahidul Hoque
Sponsors
| Sponsor | Tier |
| Symantec | Platinum |
| Tines | Gold |
| Gold | |
| edgescan | Silver |
| Amazon | Silver |
| Integrity360 | Silver |
| BH Consulting | Bronze |
| f5 | Bronze |
| tenable | Bronze |
| Sentinel GRC | Bronze |
| YesWeHack | Afterparty |