Metasploit Town Hall Finale
I PWN thee, I PWN thee not!
Scientific computing for information security – forging the missing link
Defeating Next-Gen AV and EDR: Using Old (And New) Tricks on New Dogs
The Hackers Apprentice
How to Tell the C-Level Their Baby is Ugly
Collect All the Data - Protect All the Things
Lying in Wait: Discovering and Exploiting Weaknesses in Automated Discovery Actions
Inter-chip communication - Testing end-to-end security on IoT
REST in Peace: Abusing GraphQL to Attack Underlying Infrastructure
The “Art” of The BEC - What Three Years of Fighting Has Taught Us
BloodHound: Head to Tail
Red Team Methodology: A Naked Look
API Keys, Now What?Taking the Pen Test Into the Amazon Cloud
Rise of the Machines // using machine learning with GRC
How to Give the Gift That Keeps on Giving - Your Knowledge
The Backup Operators Guide to the Galaxy
SS7 for INFOSEC
Empathy as a Service to Create a Culture of Security
Welcome to the Jumble: Improving RDP Tooling for Malware Analysis and Pentesting