Le Tour Du Hack 2025

10th - 11th May 2025

Event Starts in:

About

Le Tour Du Hack is an annual student-run cybersecurity conference bringing together experts, enthusiasts, and curious minds for two days of technical talks, challenges, and of course, networking. Stay on top of the latest developments and immerse yourself in the scottish cybersecurity community!

ENUSEC was founded in 2015, making this year ENUSEC's 10th birthday! Because of this we are making sure that Le Tour Du Hack 2025 will be bigger and better than ever. We cant wait for you to see what we have in store!

🎉 Help us celebrate 10 years of ENUSEC!
Submit your photos from past events or this year's conference

This year's special 10th anniversary edition brings together current students, Edinburgh Napier Alumni, industry professionals, and cybersecurity enthusiasts from across the UK and beyond. Check out the Edinburgh Napier University blog post featuring this milestone celebration!

Interested in what happens on the day? Check out the LTDH24 page to see highlights from last year's conference.

Past Event Graphic Grid

Our Sponsors

Le Tour Du Hack 2025 is made possible thanks to the generous support of our sponsors.

Conference Schedule

Here's the full schedule for Le Tour Du Hack 2025. We have three exciting tracks of presentations running in parallel.

09:00 - 09:30

Registration

09:30 - 10:00

Opening Remarks - Track 2

10:00 - 10:45

Opening Keynote - Track 2

Prof. Bill Buchanan, Edinburgh Napier University

10:45 - 11:15

Adrian Smales

Health, IoT, Robotics & Digital Evidence

James Kwaan

10 Years on, What is new on the threat landscape?

Karen Taljard

Burning the candle at all ends

11:15 - 11:20

Break

11:20 - 12:20

Michael Varley

Ransomware Diaries: Hackers, Hostages and the Price of Panic

Basil Manoussos

Digital Evidence in the times of Artificial Intelligence. A glimpse into the future

Fraser Wilson

They're Listening, But is it You That's Talking!

12:30 - 13:30

Lunch

13:30 - 14:15

Panel Discussion - Track 2

Neurodiversity in Cyber - Superpower vs. Kryptonite?

14:15 - 14:20

Break

14:20 - 14:50

David Brown

Cyber War Chronicles: My Path to Becoming a DFIR Consultant

Eliot Bolster

Is my OT becoming Rusty?

Del Delgiannoudis

The Absolute State of Nvidia

14:55 - 15:55

Dónnan Mallon

InfoStealerz - The Phantom Menace

Harry McLaren

Modern Cybersecurity Operations: Responsibilities, Knowledge & Skills

Cameron Cottam

CAPTCHA Clicked, System Compromised: Understanding the ClickFix Phishing Technique

15:55 - 16:15

Afternoon Refreshments

16:15 - 17:00

Kirils Solovjovs

A Big Bad App: Welcome to Corporatocracy

Thomas Xuan Meng

The Evolution of Syscalls: A Winding Path to Untraceable Execution

Kat Fitzgerald

Confound and Delay: Honeypot Chronicles from the Digital Battlefield

17:00 - 17:45

Closing Keynote - Track 2

Cary Hendricks, ID Cyber Solutions

17:45 - 18:00

Closing Remarks

Day 2

Capture The Flag Competition

09:00

CTF Registration

10:00

CTF Competition Starts

13:00

Pizza Lunch - CTF Paused

16:00

CTF Competition Ends

Track 1 - Lindsay Stewart Lecture Theatre

10:45 - 11:15

Health, IoT, Robotics & Digital Evidence

Adrian Smales

Pacemakers, insulin pumps and autonomous gadgets now chat over 5G, but every heartbeat they broadcast is an open invitation to hackers. The warning is clear: when code meets flesh, failures aren't blue screens—they're funerals. Regulators finally demand cybersecurity, yet current standards ignore digital evidence.

11:20 - 12:20

Ransomware Diaries: Hackers, Hostages and the Price of Panic

Michael Varley

Step into the high-stakes world of ransomware incidents, where companies face impossible choices and criminals sometimes show unexpected mercy. Through real-world case studies, we'll unravel how attackers break in, how they steal data, how they cripple organisations and what happens when victims negotiate.

14:20 - 14:50

Cyber War Chronicles: My Path to Becoming a DFIR Consultant

David Brown

Navigating your way through life can be a challenge. Having done Computer Science at Uni in the very early 00's then joining the Police I now find myself as a Principal DFIR Consultant for one of the world's leading Cyber companies.

14:55 - 15:55

InfoStealerz - The Phantom Menace

Dónnan Mallon

Welcome to the wacky world of Information Stealers! They come in all shapes and sizes. We'll be discussing the rise and impact these infostealers have had globally throughout various industries and how some have met their downfall through Law Enforcement.

16:15 - 17:00

A Big Bad App: Welcome to Corporatocracy

Kirils Solovjovs

We live in a world where corporations decide how we interact with digital systems, and they are not on our side. If something goes wrong and you're not the 1,000th person to report it, it's your problem. Customer service? That's just a chatbot pretending to care.

Track 2 - Riady Lecture Theatre

09:30 - 10:00

Opening Remarks

10:00 - 10:45

Opening Keynote

Prof. Bill Buchanan, Edinburgh Napier University

10:45 - 11:15

Le Tour de Hack: What has changed in cyber disruption in 10 years and what skills do you need to be successful now?

James Kwaan

In the last 10 years there have been significant changes, I will cover the key factors affecting the threat landscape to help us understand who is likely to attack us and why? I will explore the disruptive geopolitical context and current threats and trends and the new frontiers which cyber is now breaking into.

11:20 - 12:20

Digital Evidence in the times of Artificial Intelligence. A glimpse into the future

Basil Manoussos

Digital Forensics and Digital Evidence have long been viewed as the "poor relation" of Cybersecurity—often overlooked by both academia and industry. However, the tide is turning. With the growing sophistication of cybercrime, these fields are gaining the attention they deserve.

13:30 - 14:15

Panel Discussion: Neurodiversity in Cyber - Superpower vs. Kryptonite?

Sharon Moore, Sarah Williamson, Jonathan Marnoch, Ruby Richardson, Stephanie Golstov

14:20 - 15:50

Is my OT becoming Rusty?

Eliot Bolster

Could Rust be a viable option for coding our critical OT systems, adding another language to the IEC 61131-3 standard? Despite IT loving a trend it has always been harder for these trends to get adopted within industrial systems.

14:55 - 15:55

Modern Cybersecurity Operations: Responsibilities, Knowledge & Skills

Harry McLaren

Overview of why cyber is an interesting place to work, what 'cybersecurity operations' is, the main focuses of the blue team (preparation, detection, response and recovery), adversary knowledge frameworks (ATT&CK), and finally an overview of important technical and behavioural skills needed in 2025 and beyond!

16:15 - 17:00

The Evolution of Syscalls: A Winding Path to Untraceable Execution

Thomas Xuan Meng

This presentation provides a step-by-step, technical exploration of the evolution of syscalls. It begins with the fundamental role of NT Windows APIs in executing syscalls within kernel space.

17:00 - 17:45

Closing Keynote

Cary Hendricks, ID Cyber Solutions

17:45 - 18:00

Closing Remarks

Track 3 - Room 1/10

10:45 - 11:30

Burning the Candle at all Ends

Karen Taljard

Life sucks. Between the chaos of work life and personal life, it can be hard to make time for some R&R. Today we will discuss what you can do to better manage the chaos as well as activities you can do to unwind and disconnect from the world for a bit.

11:35 - 12:20

They're Listening, But is it You That's Talking!

Fraser Wilson

Smart voice assistants are everywhere and have so much access to our lives and data and rely upon tools like Automatic Speaker Verification to secure their access, but how good are they really at telling whether it is you. Let's look at audio based attacks and see how secure (or unsecure) they really are, and then lets talk all things audio weirdness.

14:20 - 14:50

The Absolute State of Nvidia

Del Delgiannoudis

Since 2018, Nvidia's consumer graphics division has been developing a severe case of we-don't-care-about-you-itis. As much as it's a well known fact that corporations are not our friends, for this talk I'd like to investigate the specific, targeted and arguably malicious ways in which Nvidia has gone out of their way to screw over their GeForce customers.

14:55 - 15:55

From Verification to Infection: A Deep Dive into ClickFix Techniques and Fake CAPTCHA Exploits

Cameron Cottam

CAPTCHAs are widely used as a security measure to distinguish humans from bots. However, threat actors have been exploiting this tool into a technique known as ClickFix. By presenting fake "Verify You Are a Human" CAPTCHA pages, attackers aim to trick users into executing malicious PowerShell commands.

16:15 - 17:00

Confound and Delay: Honeypot Chronicles from the Digital Battlefield

Kat Fitzgerald

Embark on a whirlwind tour of global cyber deception with a seasoned(?) security engineer who's been running honeypots in some of the world's most intriguing locales, including the bustling digital battleground of Ukraine.

Keynote Speakers

Opening Keynote: 10:00-10:45

Prof. Bill Buchanan OBE FRSE

Edinburgh Napier University

Professor at Edinburgh Napier University

Bill Buchanan is a Professor in the School of Computing at Edinburgh Napier University, a Fellow of the BCS and Principal Fellow of the HEA. He was appointed an Officer of the Order of the British Empire in 2017 and has won student-voted awards of teaching excellence in 2011, 2014, 2015, 2019, 2020 and 2023. He is also the creator of the Blockpass Identity Lab at Napier's Merchiston campus. He has published over 30 academic books and over 300 research papers.

Closing Keynote: 17:00-17:45

Cary Hendricks

ID Cyber Solutions

Global Operations Director at ID Cyber Solutions

Cary is an accomplished security technical investigator, advisor and trainer with several decades of experience working with various agencies across the world. He often talks about stuff and things. He is the lead instructor for ID Cyber Solutions and ID Cyber Training UK, which delivers training on Incident Handling, Digital Forensics and Ethical Hacking. He sits on various boards in the UK coordinating cyber security practices in education, the space industry, supply chains and various cyber security frameworks supported by the NCSC. He is always willing to help wherever he can to make other people’s lives easier*
(*some effort required)

Panel Discussion: Neurodiversity in Cyber - Superpower vs. Kryptonite?

We're so glad to be bringing back the Panel event again this year, as it has been very well received over the years it has ran; always bringing insightful questions and industry experience to the forefront. This year, we believe the panel topic of 'Neurodiversity in Cyber: Superpower vs. Kryptonite' is more relevant than ever, especially as neurodivergent individuals become recognised within the industry.

"About 15% to 20% of the world's population shows signs of neurodivergence" - Northwestern Medicine, 2025

In an industry that thrives on unconventional thinking, this is not just a statistic. It's a reminder of the incredible diversity of minds shaping cybersecurity. Whether you personally identify as neurodivergent or not, these conversations impact all of us. From recruitment and workplace culture to problem-solving approaches, understanding and embracing neurodiversity makes our community stronger.

So make sure to come along to hear what our brilliant panelists have to say, challenge your assumptions, and ask your questions - this space is for you too!

Sharon Moore MBE

Sharon is IBM's CTO for Public Sector in the UK, with a personal goal to transform public service, safety and policing with technology. She has over 20 years of experience working in the tech industry, across multiple sectors, and you’ll often find her on stage helping shape the impact technology can have on our lives.

Sarah Williamson

Sarah is a Social Work Operational Manager for mental health services in Renfrewshire. A social worker since 2011, Sarah has specialised in mental health since 2016. An accredited trainer in suicide intervention through LivingWorks, Sarah has been in management positions for 5 years and works with a diverse range of staff including those who need additional support or adapted working arrangements to reach their full potential at work.

Jonathan Marnoch

A season IT professional with 25 years of experience. Jonathan (Jonty) Marnoch has worked with some of the largest companies in the UK and globally. Currently Principle Cyber Security Architect at JLR their expertise spans various sectors, including Defence, Banking, Utilities, Retail and currently automotive.

Ruby Richardson

Ruby is a 4th year BEng student in Cybersecurity and Forensics at Edinburgh Napier University. During her third year, she completed a year long industrial placement at Gymshark, where she gained hands on experience across a range of cybersecurity roles. Diagnosed with dyslexia in primary school, Ruby has had to continually adapt to overcome challenges, both academically and professionally.

Stephanie Golstov

Steph is a creative and strategic consultant specialising in digital transformation. She co-founded the digital consultancy Osta Labs Ltd which, for the past seven years has supported clients with digital strategy, machine learning and AI-readiness. Steph is proudly and (mostly) comfortably neurodivergent and has a particular interest in how technology can support inclusive and exciting workplaces of the future.

Capture the Flag: Day Two - 9am to 4pm

Ready to put your hacking skills to the test? Join us for an adrenaline-pumping Jeopardy-style CTF where competitors unite to crack codes, exploit vulnerabilities, and outsmart security systems!

Whether you're infiltrating websites, breaking encryption algorithms, or hunting for hidden flags, our challenges are crafted for both newcomers and seasoned pros. New puzzles drop throughout the day, taking you on a thrilling tour across the Cyber Security landscape!

Compete solo or form a dream team of up to 4 hackers

Top team wins exclusive invites to next year's ZeroDays CTF

Register now at ctf.enusec.org

Important Information

The CTF will take place in track three marked on the map.
Don't forget your essentials: laptop loaded with Kali VM (not required but recommended!) and your charger!

Venue

Location: Edinburgh Napier University, Craiglockhart Campus

Address: 219 Colinton Road, Edinburgh, EH14 1DJ, Scotland



View on Google Maps


Travel & Accommodation:
The venue is easily accessible by public transport, with nearby bus and tram stops. Edinburgh Waverley and Haymarket train stations are within a short distance. A range of hotels and accommodations are available in the city centre and surrounding areas.


Accessibility:
The venue is fully wheelchair accessible, with elevator access to conference floors, and accessible restrooms. Please contact us in advance for any specific requirements.

📬 Contact Us

Join the Community

Chat with us on Discord!