Edinburgh's favourite student-led cyber security conference returns!
Day One is a standard conference with student and expert talks.
Day Two is a CTF!
See you all next year! 🤞
TW9yZSBpbmZvcm1hdGlvbiBjb21pbmcgc29vbiEgOyk=
Track 1 | Track 2 | Track 3 | |
---|---|---|---|
09:00 - 09:30 | REGISTRATION | ||
09:30 - 10:00 | OPENING REMARKS ENUSEC Committee |
||
10:00 - 10:45 | OPENING KEYNOTE - AI and Cybersecurity - A Dystopian Future Bill Buchanan |
||
10:45 - 11:45 | You're so arrogant... You probably think this talk is about you Scott McGready |
Digital, Prosecutors & Jurors: What could possibly go wrong? Basil Manoussos |
Bluetooth Security: From papers to reality Lisa |
11:45 - 12:45 | Balancing Power and peril: Navigating the possible Regulation of Artificial Intelligence for a Safer Tomorrow George Brightman |
Can't Code, Won't Code The non technical stuff I wasn't prepared for Ian Davies |
(30 min.) Link Prediction: What does the Future Hold? Madeleine Langdon ------------------ (30 min.) USB: Underestimated Security Blindspot Gordon Gray |
12:45 - 13:45 | LUNCH | ||
13:45 - 14:15 | Women In The Industry panel: "Why Tech?" | ||
14:15 - 14:45 | Compliance Is More Fun Than You Think It Is Dr Alice McGready |
From Dodos to Downloads: A Hilarious Journey Through History's Blunders and Their Lessons Jonathan Robertson |
Deepfake Dilemma Lavanya Aggarwal |
14:45 - 15:30 | Bugging you about Bug Bounty Dan Walker |
Identifying Similar Images: An introduction to evaluating perceptual hashes Dr Sean McKeown |
Understanding Risk Exposure in Your Cyber Security Supply Chain - Workshop Jacob Duane |
15:30 - 15:45 | 15 minute break | ||
15:45 - 16:30 | Security Operations 101: Insights & Careers in the Blue Team Harry McLaren |
Espionage Revealed: Analysis of a Stealthy Backdoor Jordan Ropes |
What I wish I had known about phishing reporting Peter Kirwan |
16:30 - 17:30 | CLOSING KEYNOTE Don Smith |
||
17:30 - 17:45 | CLOSING REMARKS ENUSEC Committee |