Florentine G
A Day in the Life of a Product Security Incident Response Manager
From SOC to CSIRT
How to escalate privileges to administrator in latest Windows.
Two-Factor Auth - Demand Bidirectional
Pwn All The Mobile Porn Apps
Breaking the Fourth Wall - Hacking a 50 years old myth
I Club and So Can You
Engineering My Way Into InfoSec
Introduction to Reversing and Pwning
Scamming the Scammers - Becoming the Robin Hood of the phones
Applied OSINT: Enabling Better Social Engineering for Better Pen Tests
One OSINT Tool to Rule Them All
(In)Outsider Trading - Hacking stocks using public information and influence.
Your Facts Are Not Safe with Us: Russian Information Operations as Social Engineering
Robust Defense for the rest of Us
I got more games than Milton Bradley: Incentivize a positive change in your security culture
Interrogation Techniques for Fun and Profit: Designing better tools for your SOC team
Messing with Forensic Analysts: Modifying VSS Snapshots
CTF all the things: Leveraging gamification to up your security game
Everything is Not Awesome: How to Overcome Barriers to Proper Network Segmentation
Radio frequencies all around us! What data are you leaking and what is done with it?