| Speakers |
Talk |
Video |
Slides |
| Dr Grigorios Fragkos |
Keynote: The CISO is dead; Long live the CCSO. |
|
|
| Alexander Rubin |
MySQL server attacks YOU! (How we found CVE-2023-21980 in MySQL) |
|
|
| Allyn Stott |
The Fault in Our Metrics: Rethinking How We Measure Detection & Response |
|
|
| Chris Madden |
Understanding and Using Impact so you know what Vulnerabilities to fix first |
|
|
| Sean Metcalf |
The Problem with Identity Security & How to Fix It |
|
|
| Wietze Beukema |
Command-Line Obfuscation: You can run, _and_ you can hide |
|
|
| Apostolos Giannakidis |
Identity at Risk: Identity-Centric Threat Modeling |
|
|
| Yash Sancheti |
Mastering Privilege Escalation and SSRF in Penetration Testing |
|
|
| Riccardo Ancarani & Devid Lana |
You Sh[e|a]ll not pass! Gentle Introduction to EDR Bypasses |
|
|
| Pete G |
Unearthing the Secrets of 160 Year Old Railway |
|
|
| Rory McCune |
Observability for pentesters |
|
|
| Juho Jauhiainen |
I like to MOVEit MOVEit |
|
|
| Adrian Sanchez Hernandez & Asli Koksal |
Demystifying APT42 Cyberoperations |
|
|
| Chris Madden |
Exploit Prediction Scoring System (EPSS) - The User Guide |
|
|
| David French |
From soup to nuts: Building a Detection-as-Code pipeline |
|
|
| Alex Devassy |
Into the Abyss: Adversarial Tactics in AI Security |
|
|
| Vangelis Stykas |
Locknote: Beyond the Endpoint: My Adventures in API Security Research. |
|
|