A Deep Dive into the Triad Nexus Pig Butchering & Money Laundering Network [Kasey Best & Zach Edwards]
A Deep Dive into the Triad Nexus Pig Butchering & Money Laundering Network [Kasey Best & Zach Edwards] Excellent
A Deep Dive into the Triad Nexus Pig Butchering & Money Laundering Network [Kasey Best & Zach Edwards] Good
A Deep Dive into the Triad Nexus Pig Butchering & Money Laundering Network [Kasey Best & Zach Edwards] Average
A Deep Dive into the Triad Nexus Pig Butchering & Money Laundering Network [Kasey Best & Zach Edwards] Below Average
A Deep Dive into the Triad Nexus Pig Butchering & Money Laundering Network [Kasey Best & Zach Edwards] Poor
A Deep Dive into the Triad Nexus Pig Butchering & Money Laundering Network [Kasey Best & Zach Edwards] N/A
Any feedback you would like shared with this speaker?
Attacking LLM Detectors with Homoglyph-Based Attacks [Aldan Creo]
Attacking LLM Detectors with Homoglyph-Based Attacks [Aldan Creo] Excellent
Attacking LLM Detectors with Homoglyph-Based Attacks [Aldan Creo] Good
Attacking LLM Detectors with Homoglyph-Based Attacks [Aldan Creo] Average
Attacking LLM Detectors with Homoglyph-Based Attacks [Aldan Creo] Below Average
Attacking LLM Detectors with Homoglyph-Based Attacks [Aldan Creo] Poor
Attacking LLM Detectors with Homoglyph-Based Attacks [Aldan Creo] N/A
Any feedback you would like shared with this speaker?
Breaching a Bank: Mission Impossible Style [Ridhwan Roshan]
Breaching a Bank: Mission Impossible Style [Ridhwan Roshan] Excellent
Breaching a Bank: Mission Impossible Style [Ridhwan Roshan] Good
Breaching a Bank: Mission Impossible Style [Ridhwan Roshan] Average
Breaching a Bank: Mission Impossible Style [Ridhwan Roshan] Below Average
Breaching a Bank: Mission Impossible Style [Ridhwan Roshan] Poor
Breaching a Bank: Mission Impossible Style [Ridhwan Roshan] N/A
Any feedback you would like shared with this speaker?
Death by Metrics: How Numbers Can Kill Your Security [Valentine Mairet]
Death by Metrics: How Numbers Can Kill Your Security [Valentine Mairet] Excellent
Death by Metrics: How Numbers Can Kill Your Security [Valentine Mairet] Good
Death by Metrics: How Numbers Can Kill Your Security [Valentine Mairet] Average
Death by Metrics: How Numbers Can Kill Your Security [Valentine Mairet] Below Average
Death by Metrics: How Numbers Can Kill Your Security [Valentine Mairet] Poor
Death by Metrics: How Numbers Can Kill Your Security [Valentine Mairet] N/A
Any feedback you would like shared with this speaker?
Demystifying the First Few Minutes After Compromising a Container [Stuart McMurray]
Demystifying the First Few Minutes After Compromising a Container [Stuart McMurray] Excellent
Demystifying the First Few Minutes After Compromising a Container [Stuart McMurray] Good
Demystifying the First Few Minutes After Compromising a Container [Stuart McMurray] Average
Demystifying the First Few Minutes After Compromising a Container [Stuart McMurray] Below Average
Demystifying the First Few Minutes After Compromising a Container [Stuart McMurray] Poor
Demystifying the First Few Minutes After Compromising a Container [Stuart McMurray] N/A
Any feedback you would like shared with this speaker?
Detecting Threats at Hyperscale: My Journey and Lessons from Google's Front Lines [Domagoj Klasic]
Detecting Threats at Hyperscale: My Journey and Lessons from Google's Front Lines [Domagoj Klasic] Excellent
Detecting Threats at Hyperscale: My Journey and Lessons from Google's Front Lines [Domagoj Klasic] Good
Detecting Threats at Hyperscale: My Journey and Lessons from Google's Front Lines [Domagoj Klasic] Average
Detecting Threats at Hyperscale: My Journey and Lessons from Google's Front Lines [Domagoj Klasic] Below Average
Detecting Threats at Hyperscale: My Journey and Lessons from Google's Front Lines [Domagoj Klasic] Poor
Detecting Threats at Hyperscale: My Journey and Lessons from Google's Front Lines [Domagoj Klasic] N/A
Any feedback you would like shared with this speaker?
Dungeons & Dragons: The security tool you didn’t know you needed [Klaus Agnoletti]
Dungeons & Dragons: The security tool you didn’t know you needed [Klaus Agnoletti] Excellent
Dungeons & Dragons: The security tool you didn’t know you needed [Klaus Agnoletti] Good
Dungeons & Dragons: The security tool you didn’t know you needed [Klaus Agnoletti] Average
Dungeons & Dragons: The security tool you didn’t know you needed [Klaus Agnoletti] Below Average
Dungeons & Dragons: The security tool you didn’t know you needed [Klaus Agnoletti] Poor
Dungeons & Dragons: The security tool you didn’t know you needed [Klaus Agnoletti] N/A
Any feedback you would like shared with this speaker?
Exploiting the Web with Charsets [Cillian Collins]
Exploiting the Web with Charsets [Cillian Collins] Excellent
Exploiting the Web with Charsets [Cillian Collins] Good
Exploiting the Web with Charsets [Cillian Collins] Average
Exploiting the Web with Charsets [Cillian Collins] Below Average
Exploiting the Web with Charsets [Cillian Collins] Poor
Exploiting the Web with Charsets [Cillian Collins] N/A
Any feedback you would like shared with this speaker?
From Quantum Threats to Quantum Shields - A Comprehensive Guide to Post-Quantum Cryptography [Panagiotis (Panos) Vlachos]
From Quantum Threats to Quantum Shields - A Comprehensive Guide to Post-Quantum Cryptography [Panagiotis (Panos) Vlachos] Excellent
From Quantum Threats to Quantum Shields - A Comprehensive Guide to Post-Quantum Cryptography [Panagiotis (Panos) Vlachos] Good
From Quantum Threats to Quantum Shields - A Comprehensive Guide to Post-Quantum Cryptography [Panagiotis (Panos) Vlachos] Average
From Quantum Threats to Quantum Shields - A Comprehensive Guide to Post-Quantum Cryptography [Panagiotis (Panos) Vlachos] Below Average
From Quantum Threats to Quantum Shields - A Comprehensive Guide to Post-Quantum Cryptography [Panagiotis (Panos) Vlachos] Poor
From Quantum Threats to Quantum Shields - A Comprehensive Guide to Post-Quantum Cryptography [Panagiotis (Panos) Vlachos] N/A
Any feedback you would like shared with this speaker?
Gotta Escape 'Em All - Can We Exploit RCE in a GBA Emulator For Fun and Profit? [Rebecca Martin]
Gotta Escape 'Em All - Can We Exploit RCE in a GBA Emulator For Fun and Profit? [Rebecca Martin] Excellent
Gotta Escape 'Em All - Can We Exploit RCE in a GBA Emulator For Fun and Profit? [Rebecca Martin] Good
Gotta Escape 'Em All - Can We Exploit RCE in a GBA Emulator For Fun and Profit? [Rebecca Martin] Average
Gotta Escape 'Em All - Can We Exploit RCE in a GBA Emulator For Fun and Profit? [Rebecca Martin] Below Average
Gotta Escape 'Em All - Can We Exploit RCE in a GBA Emulator For Fun and Profit? [Rebecca Martin] Poor
Gotta Escape 'Em All - Can We Exploit RCE in a GBA Emulator For Fun and Profit? [Rebecca Martin] N/A
Any feedback you would like shared with this speaker?
Hackers with Radios: Security and the Physical Layer [Mark Megarry]
Hackers with Radios: Security and the Physical Layer [Mark Megarry] Excellent
Hackers with Radios: Security and the Physical Layer [Mark Megarry] Good
Hackers with Radios: Security and the Physical Layer [Mark Megarry] Average
Hackers with Radios: Security and the Physical Layer [Mark Megarry] Below Average
Hackers with Radios: Security and the Physical Layer [Mark Megarry] Poor
Hackers with Radios: Security and the Physical Layer [Mark Megarry] N/A
Any feedback you would like shared with this speaker?
I Am Not Who I Am: Bypassing Biometric Authentication Systems [Oluwasefunmi Alabi]
I Am Not Who I Am: Bypassing Biometric Authentication Systems [Oluwasefunmi Alabi] Excellent
I Am Not Who I Am: Bypassing Biometric Authentication Systems [Oluwasefunmi Alabi] Good
I Am Not Who I Am: Bypassing Biometric Authentication Systems [Oluwasefunmi Alabi] Average
I Am Not Who I Am: Bypassing Biometric Authentication Systems [Oluwasefunmi Alabi] Below Average
I Am Not Who I Am: Bypassing Biometric Authentication Systems [Oluwasefunmi Alabi] Poor
I Am Not Who I Am: Bypassing Biometric Authentication Systems [Oluwasefunmi Alabi] N/A
Any feedback you would like shared with this speaker?
Is malware getting smarter? Exploring AI-driven threats and solutions [Candid Wuest]
Is malware getting smarter? Exploring AI-driven threats and solutions [Candid Wuest] Excellent
Is malware getting smarter? Exploring AI-driven threats and solutions [Candid Wuest] Good
Is malware getting smarter? Exploring AI-driven threats and solutions [Candid Wuest] Average
Is malware getting smarter? Exploring AI-driven threats and solutions [Candid Wuest] Below Average
Is malware getting smarter? Exploring AI-driven threats and solutions [Candid Wuest] Poor
Is malware getting smarter? Exploring AI-driven threats and solutions [Candid Wuest] N/A
Any feedback you would like shared with this speaker?
Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones [Balazs Bucsay]
Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones [Balazs Bucsay] Excellent
Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones [Balazs Bucsay] Good
Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones [Balazs Bucsay] Average
Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones [Balazs Bucsay] Below Average
Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones [Balazs Bucsay] Poor
Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones [Balazs Bucsay] N/A
Any feedback you would like shared with this speaker?
Locknote: On (Un)Natural Selection: The Evolution of Malware [Lena Yu]
Locknote: On (Un)Natural Selection: The Evolution of Malware [Lena Yu] Excellent
Locknote: On (Un)Natural Selection: The Evolution of Malware [Lena Yu] Good
Locknote: On (Un)Natural Selection: The Evolution of Malware [Lena Yu] Average
Locknote: On (Un)Natural Selection: The Evolution of Malware [Lena Yu] Below Average
Locknote: On (Un)Natural Selection: The Evolution of Malware [Lena Yu] Poor
Locknote: On (Un)Natural Selection: The Evolution of Malware [Lena Yu] N/A
Any feedback you would like shared with this speaker?
Managing AI Effectively: A Practical Guide Using NIST AI Risk Management Framework [Stefania Lauciello]
Managing AI Effectively: A Practical Guide Using NIST AI Risk Management Framework [Stefania Lauciello] Excellent
Managing AI Effectively: A Practical Guide Using NIST AI Risk Management Framework [Stefania Lauciello] Good
Managing AI Effectively: A Practical Guide Using NIST AI Risk Management Framework [Stefania Lauciello] Average
Managing AI Effectively: A Practical Guide Using NIST AI Risk Management Framework [Stefania Lauciello] Below Average
Managing AI Effectively: A Practical Guide Using NIST AI Risk Management Framework [Stefania Lauciello] Poor
Managing AI Effectively: A Practical Guide Using NIST AI Risk Management Framework [Stefania Lauciello] N/A
Any feedback you would like shared with this speaker?
One Bug, Two Bug, Red Bug, Blue Bug [Lea Snyder & Patrick Fitzgerald]
One Bug, Two Bug, Red Bug, Blue Bug [Lea Snyder & Patrick Fitzgerald] Excellent
One Bug, Two Bug, Red Bug, Blue Bug [Lea Snyder & Patrick Fitzgerald] Good
One Bug, Two Bug, Red Bug, Blue Bug [Lea Snyder & Patrick Fitzgerald] Average
One Bug, Two Bug, Red Bug, Blue Bug [Lea Snyder & Patrick Fitzgerald] Below Average
One Bug, Two Bug, Red Bug, Blue Bug [Lea Snyder & Patrick Fitzgerald] Poor
One Bug, Two Bug, Red Bug, Blue Bug [Lea Snyder & Patrick Fitzgerald] N/A
Any feedback you would like shared with this speaker?
Opening Keynote: Long Overdue: Making InfoSec Better Through Library Science [Tracy Z. Maleeff]
Opening Keynote: Long Overdue: Making InfoSec Better Through Library Science [Tracy Z. Maleeff] Excellent
Opening Keynote: Long Overdue: Making InfoSec Better Through Library Science [Tracy Z. Maleeff] Good
Opening Keynote: Long Overdue: Making InfoSec Better Through Library Science [Tracy Z. Maleeff] Average
Opening Keynote: Long Overdue: Making InfoSec Better Through Library Science [Tracy Z. Maleeff] Below Average
Opening Keynote: Long Overdue: Making InfoSec Better Through Library Science [Tracy Z. Maleeff] Poor
Opening Keynote: Long Overdue: Making InfoSec Better Through Library Science [Tracy Z. Maleeff] N/A
Any feedback you would like shared with this speaker?
Performing a 0-click Token Heist in Microsoft Teams Meetings [Evan Grant]
Performing a 0-click Token Heist in Microsoft Teams Meetings [Evan Grant] Excellent
Performing a 0-click Token Heist in Microsoft Teams Meetings [Evan Grant] Good
Performing a 0-click Token Heist in Microsoft Teams Meetings [Evan Grant] Average
Performing a 0-click Token Heist in Microsoft Teams Meetings [Evan Grant] Below Average
Performing a 0-click Token Heist in Microsoft Teams Meetings [Evan Grant] Poor
Performing a 0-click Token Heist in Microsoft Teams Meetings [Evan Grant] N/A
Any feedback you would like shared with this speaker?
Restless Guests: From Subscription to Backdoor Intruder [Simon Maxwell-Stewart]
Restless Guests: From Subscription to Backdoor Intruder [Simon Maxwell-Stewart] Excellent
Restless Guests: From Subscription to Backdoor Intruder [Simon Maxwell-Stewart] Good
Restless Guests: From Subscription to Backdoor Intruder [Simon Maxwell-Stewart] Average
Restless Guests: From Subscription to Backdoor Intruder [Simon Maxwell-Stewart] Below Average
Restless Guests: From Subscription to Backdoor Intruder [Simon Maxwell-Stewart] Poor
Restless Guests: From Subscription to Backdoor Intruder [Simon Maxwell-Stewart] N/A
Any feedback you would like shared with this speaker?
Right To Repair: Tractors, Hackers, And Property Rights [Ciaran Conliffe]
Right To Repair: Tractors, Hackers, And Property Rights [Ciaran Conliffe] Excellent
Right To Repair: Tractors, Hackers, And Property Rights [Ciaran Conliffe] Good
Right To Repair: Tractors, Hackers, And Property Rights [Ciaran Conliffe] Average
Right To Repair: Tractors, Hackers, And Property Rights [Ciaran Conliffe] Below Average
Right To Repair: Tractors, Hackers, And Property Rights [Ciaran Conliffe] Poor
Right To Repair: Tractors, Hackers, And Property Rights [Ciaran Conliffe] N/A
Any feedback you would like shared with this speaker?
Rookie Talk: Decoding the Human Firewall: The Psychology Behind Social Engineering Attacks [Svitlana Samko]
Rookie Talk: Decoding the Human Firewall: The Psychology Behind Social Engineering Attacks [Svitlana Samko] Excellent
Rookie Talk: Decoding the Human Firewall: The Psychology Behind Social Engineering Attacks [Svitlana Samko] Good
Rookie Talk: Decoding the Human Firewall: The Psychology Behind Social Engineering Attacks [Svitlana Samko] Average
Rookie Talk: Decoding the Human Firewall: The Psychology Behind Social Engineering Attacks [Svitlana Samko] Below Average
Rookie Talk: Decoding the Human Firewall: The Psychology Behind Social Engineering Attacks [Svitlana Samko] Poor
Rookie Talk: Decoding the Human Firewall: The Psychology Behind Social Engineering Attacks [Svitlana Samko] N/A
Any feedback you would like shared with this speaker?
Rookie Talk: IoT/Embedded Device Security [Poorna Vettiparampil Damodaran]
Rookie Talk: IoT/Embedded Device Security [Poorna Vettiparampil Damodaran] Excellent
Rookie Talk: IoT/Embedded Device Security [Poorna Vettiparampil Damodaran] Good
Rookie Talk: IoT/Embedded Device Security [Poorna Vettiparampil Damodaran] Average
Rookie Talk: IoT/Embedded Device Security [Poorna Vettiparampil Damodaran] Below Average
Rookie Talk: IoT/Embedded Device Security [Poorna Vettiparampil Damodaran] Poor
Rookie Talk: IoT/Embedded Device Security [Poorna Vettiparampil Damodaran] N/A
Any feedback you would like shared with this speaker?
Rookie Talk: Irish SMEs are tired, scared and confused about Cybersecurity. What do we do? [Caoimhe Tiernan]
Rookie Talk: Irish SMEs are tired, scared and confused about Cybersecurity. What do we do? [Caoimhe Tiernan] Excellent
Rookie Talk: Irish SMEs are tired, scared and confused about Cybersecurity. What do we do? [Caoimhe Tiernan] Good
Rookie Talk: Irish SMEs are tired, scared and confused about Cybersecurity. What do we do? [Caoimhe Tiernan] Average
Rookie Talk: Irish SMEs are tired, scared and confused about Cybersecurity. What do we do? [Caoimhe Tiernan] Below Average
Rookie Talk: Irish SMEs are tired, scared and confused about Cybersecurity. What do we do? [Caoimhe Tiernan] Poor
Rookie Talk: Irish SMEs are tired, scared and confused about Cybersecurity. What do we do? [Caoimhe Tiernan] N/A
Any feedback you would like shared with this speaker?
Rookie Talk: Security as a Product Feature (Not a Burden) [Klaudia Obieglo]
Rookie Talk: Security as a Product Feature (Not a Burden) [Klaudia Obieglo] Excellent
Rookie Talk: Security as a Product Feature (Not a Burden) [Klaudia Obieglo] Good
Rookie Talk: Security as a Product Feature (Not a Burden) [Klaudia Obieglo] Average
Rookie Talk: Security as a Product Feature (Not a Burden) [Klaudia Obieglo] Below Average
Rookie Talk: Security as a Product Feature (Not a Burden) [Klaudia Obieglo] Poor
Rookie Talk: Security as a Product Feature (Not a Burden) [Klaudia Obieglo] N/A
Any feedback you would like shared with this speaker?
Rookie Talk: What's Old is New: Vulnerabilities in GraphQL [Aleksa Zatezalo]
Rookie Talk: What's Old is New: Vulnerabilities in GraphQL [Aleksa Zatezalo] Excellent
Rookie Talk: What's Old is New: Vulnerabilities in GraphQL [Aleksa Zatezalo] Good
Rookie Talk: What's Old is New: Vulnerabilities in GraphQL [Aleksa Zatezalo] Average
Rookie Talk: What's Old is New: Vulnerabilities in GraphQL [Aleksa Zatezalo] Below Average
Rookie Talk: What's Old is New: Vulnerabilities in GraphQL [Aleksa Zatezalo] Poor
Rookie Talk: What's Old is New: Vulnerabilities in GraphQL [Aleksa Zatezalo] N/A
Any feedback you would like shared with this speaker?
SaaSquatch Hunters: Threat Detection in the Wild of SaaS [Julie Agnes Sparks]
SaaSquatch Hunters: Threat Detection in the Wild of SaaS [Julie Agnes Sparks] Excellent
SaaSquatch Hunters: Threat Detection in the Wild of SaaS [Julie Agnes Sparks] Good
SaaSquatch Hunters: Threat Detection in the Wild of SaaS [Julie Agnes Sparks] Average
SaaSquatch Hunters: Threat Detection in the Wild of SaaS [Julie Agnes Sparks] Below Average
SaaSquatch Hunters: Threat Detection in the Wild of SaaS [Julie Agnes Sparks] Poor
SaaSquatch Hunters: Threat Detection in the Wild of SaaS [Julie Agnes Sparks] N/A
Any feedback you would like shared with this speaker?
Start covering your bases & Stop chasing APT headlines [Matan Mittelman]
Start covering your bases & Stop chasing APT headlines [Matan Mittelman] Excellent
Start covering your bases & Stop chasing APT headlines [Matan Mittelman] Good
Start covering your bases & Stop chasing APT headlines [Matan Mittelman] Average
Start covering your bases & Stop chasing APT headlines [Matan Mittelman] Below Average
Start covering your bases & Stop chasing APT headlines [Matan Mittelman] Poor
Start covering your bases & Stop chasing APT headlines [Matan Mittelman] N/A
Any feedback you would like shared with this speaker?
The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones [Katie Colgan]
The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones [Katie Colgan] Excellent
The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones [Katie Colgan] Good
The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones [Katie Colgan] Average
The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones [Katie Colgan] Below Average
The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones [Katie Colgan] Poor
The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones [Katie Colgan] N/A
Any feedback you would like shared with this speaker?
The Human Factor: Quantifying Human Risk [Sara Anstey]
The Human Factor: Quantifying Human Risk [Sara Anstey] Excellent
The Human Factor: Quantifying Human Risk [Sara Anstey] Good
The Human Factor: Quantifying Human Risk [Sara Anstey] Average
The Human Factor: Quantifying Human Risk [Sara Anstey] Below Average
The Human Factor: Quantifying Human Risk [Sara Anstey] Poor
The Human Factor: Quantifying Human Risk [Sara Anstey] N/A
Any feedback you would like shared with this speaker?
The Pitfalls of Poor Remediation: How Companies Sabotage Incident Response Efforts [Giorgio Perticone]
The Pitfalls of Poor Remediation: How Companies Sabotage Incident Response Efforts [Giorgio Perticone] Excellent
The Pitfalls of Poor Remediation: How Companies Sabotage Incident Response Efforts [Giorgio Perticone] Good
The Pitfalls of Poor Remediation: How Companies Sabotage Incident Response Efforts [Giorgio Perticone] Average
The Pitfalls of Poor Remediation: How Companies Sabotage Incident Response Efforts [Giorgio Perticone] Below Average
The Pitfalls of Poor Remediation: How Companies Sabotage Incident Response Efforts [Giorgio Perticone] Poor
The Pitfalls of Poor Remediation: How Companies Sabotage Incident Response Efforts [Giorgio Perticone] N/A
Any feedback you would like shared with this speaker?
Threat Modeling Meets Model Training: Web App Security Skills for AI [Breanne Boland]
Threat Modeling Meets Model Training: Web App Security Skills for AI [Breanne Boland] Excellent
Threat Modeling Meets Model Training: Web App Security Skills for AI [Breanne Boland] Good
Threat Modeling Meets Model Training: Web App Security Skills for AI [Breanne Boland] Average
Threat Modeling Meets Model Training: Web App Security Skills for AI [Breanne Boland] Below Average
Threat Modeling Meets Model Training: Web App Security Skills for AI [Breanne Boland] Poor
Threat Modeling Meets Model Training: Web App Security Skills for AI [Breanne Boland] N/A
Any feedback you would like shared with this speaker?
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots [Allyn Stott]
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots [Allyn Stott] Excellent
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots [Allyn Stott] Good
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots [Allyn Stott] Average
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots [Allyn Stott] Below Average
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots [Allyn Stott] Poor
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots [Allyn Stott] N/A
Any feedback you would like shared with this speaker?
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios [Juho Jauhiainen]
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios [Juho Jauhiainen] Excellent
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios [Juho Jauhiainen] Good
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios [Juho Jauhiainen] Average
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios [Juho Jauhiainen] Below Average
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios [Juho Jauhiainen] Poor
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios [Juho Jauhiainen] N/A
Any feedback you would like shared with this speaker?
When SSL Fails: Tracing the SSL vuln to the most shocking real world impacts [Michelle Simpson]
When SSL Fails: Tracing the SSL vuln to the most shocking real world impacts [Michelle Simpson] Excellent
When SSL Fails: Tracing the SSL vuln to the most shocking real world impacts [Michelle Simpson] Good
When SSL Fails: Tracing the SSL vuln to the most shocking real world impacts [Michelle Simpson] Average
When SSL Fails: Tracing the SSL vuln to the most shocking real world impacts [Michelle Simpson] Below Average
When SSL Fails: Tracing the SSL vuln to the most shocking real world impacts [Michelle Simpson] Poor
When SSL Fails: Tracing the SSL vuln to the most shocking real world impacts [Michelle Simpson] N/A
Any feedback you would like shared with this speaker?
Workshop: Client-Side Hacking with Devtools [Ciarán Cotter]
Workshop: Client-Side Hacking with Devtools [Ciarán Cotter] Excellent
Workshop: Client-Side Hacking with Devtools [Ciarán Cotter] Good
Workshop: Client-Side Hacking with Devtools [Ciarán Cotter] Average
Workshop: Client-Side Hacking with Devtools [Ciarán Cotter] Below Average
Workshop: Client-Side Hacking with Devtools [Ciarán Cotter] Poor
Workshop: Client-Side Hacking with Devtools [Ciarán Cotter] N/A
Any feedback you would like shared with this speaker?
Workshop: Cyber Simulation Exercise [Stuart Davis]
Workshop: Cyber Simulation Exercise [Stuart Davis] Excellent
Workshop: Cyber Simulation Exercise [Stuart Davis] Good
Workshop: Cyber Simulation Exercise [Stuart Davis] Average
Workshop: Cyber Simulation Exercise [Stuart Davis] Below Average
Workshop: Cyber Simulation Exercise [Stuart Davis] Poor
Workshop: Cyber Simulation Exercise [Stuart Davis] N/A
Any feedback you would like shared with this speaker?
Workshop: Roll Your Own EDR/XDR/MDR [Ken Westin]
Workshop: Roll Your Own EDR/XDR/MDR [Ken Westin] Excellent
Workshop: Roll Your Own EDR/XDR/MDR [Ken Westin] Good
Workshop: Roll Your Own EDR/XDR/MDR [Ken Westin] Average
Workshop: Roll Your Own EDR/XDR/MDR [Ken Westin] Below Average
Workshop: Roll Your Own EDR/XDR/MDR [Ken Westin] Poor
Workshop: Roll Your Own EDR/XDR/MDR [Ken Westin] N/A
Any feedback you would like shared with this speaker?