Talk Title and Speaker |
Videos |
Presentations |
[KEYNOTE] The Metadata Trap: Whistleblowers in the Age of Surveillance and Big Data by Micah Lee |
|
|
Bug Bounty: Why is this happening? by Adam Ruddermann |
|
|
Automotive Security Bugs Explained for Bug Hunters by Jay Turla |
|
|
PwdLess: Exploitation Tales from RouterLand by Christofaro Mune |
|
|
Rage against the IDOR’s: Using Machine Learning models to detect and stop authorization bypass vulnerabilities by Juan Berner |
|
|
Don't Ruck Us Too Hard - Owning All of Ruckus AP devices by Gal Zror |
|
|
Mlw #41: a new sophisticated loader by APT group TA505 by Alexey Vishnyakov |
|
|
Taking the guess out of Glitching by Adam Laurie |
|
|
[Workshop] Learn by Doing - DevSecOps on AWS using Cloud-Native Services by Akash Mahajan & Sunesh Govindaraj |
|
|
Internet Goverance by Ihita Gangavarapu |
|
|
Data Sniffing over Air Gap by Avni Singh & Garima Maithani |
|
|
[Workshop] Hardware Hacking by Asmita Jha |
|
|
[Closing Note] Cybersecurity In India - Information Asymmetry, Cross Border Threats and National Sovereignty by Saumil Shah |
|
|
Hacker Q&A with Nathaniel Wakelam & Laurie Mercer |
|
|
[Workshop] When Sh*t’s on Fire by Valentine Mairet & Sebastiaan Groot |
|
|
Panel: Securing the Human Factor |
|
|
Panel: Predicting Danger: Building the Ideal Threat Intelligence Model |
|
|
Panel: Lessons from the Cyber Trenches |
|
|
Panel: Complication in Security Practices |
|
|