Talks
Behold the brave offerings from our local folks.
- Breached by a Ten Foot Clown Lozza
- Buzzkill Justin Steven
- Disregard Buzzwords Adrian Hayes
- From Plug to Pwn Kylie McDevitt
- Getting down and dirty with SBOMs Colby Prior
- How I Found Two Zero-Days in ASUS's Software as a Junior Pentester MrBruh
- How to use God Mode in Windows James Spicer
- Industry Panel (Day 1) MC Ethan
- Industry Panel (Day 2) MC Ethan
- Is My Job Even Real? Bullshit Jobs in Infosec errbufferoverfl
- Model Context Protocol is Insecure by Design Jesse Merhi
- Predicting C64 chiptunes with PREFRAMR Josh Bailey
- Ransom Ain't Goin' Nowhere Calum Hall
- Responding to an ITW Chrome Sandbox Escape (Twice!) Alex Gough
- Reversing Bytecode into Bounties Giuliana & Jamal
- Security Vibe Check Jess Lowe
- Stunt Hackers Wade Winright
- The Enigma Machine Mike Pritchard
- The Future of Social Media Jon Bell
- The high-stakes cat-and-mouse game of phishing Jacob
- Those Who Do Not Learn from Advisories Are Doomed to Repeat Them Louis Nyffenegger
- Weaponising XSS for Red Teams Jesse and Noah
- What Permaculture Design Taught Me About Security Laura Wratten
- Who's the Bose? \@adamparsonz
- Why Quantum Cryptanalysis is Bollocks Peter Gutmann
- everything i needed to know about doing security on purpose i learned from anarchist organizing elle armageddon
- let’s make malware but it might get caught so the malware gets worse ☣️ Alex