All current Conference Talks courses in 2024
731 Courses
Compromising LLMs - The Advent of AI Malware
Explore the security risks of AI integration, focusing on prompt injections and potential malware in language models. Learn about future challenges and consequences for AI assistants.
What Does an LLM-Powered Threat Intelligence Program Look Like?
Explore the impact of large language models on cyber threat intelligence programs, focusing on expanded capabilities and potential return on investment for organizations.
A Manufacturer's Post-Shipment Approach to Fend-Off IoT Malware in Home Appliances
Explore a manufacturer's strategy to protect home appliances from IoT malware post-shipment, addressing rapid attack cycles and complex malware capabilities based on 5 years of IoT threat intelligence.
Guardians of the AI Era - Navigating the Cybersecurity Landscape of Tomorrow
Explore the future of cybersecurity in the AI era, examining challenges and opportunities for professionals. Learn to adapt and innovate in a rapidly evolving technological landscape.
AI Assisted Decision Making of Security Review Needs for New Features
Explore AI-assisted decision-making for identifying security review needs in new features, addressing challenges in modern SDLC and improving security oversight in fast-paced development environments.
MoustachedBouncer - AitM-Powered Surveillance via Belarus ISPs
Uncovers advanced espionage group using AitM attacks and ISP-level tampering in Belarus to target diplomats with custom malware, highlighting sophisticated surveillance techniques.
Unlocking Any Door in 21st Century - Immersion in Bio-Security
Explore biometric authentication vulnerabilities, AI/ML risks, and creative hacking techniques. Learn about data privacy threats and strategies to bypass liveness checks in modern security systems.
Snookered in the Pool Room
Unconventional approach to investigating cybercrime, focusing on a data centre hack case study. Explores forensic profiling, social engineering, and international law enforcement collaboration.
The Art of the Breach
Comprehensive guide to physical security breaching, from reconnaissance to exit strategies. Explores various entry methods, overcoming obstacles, and combining infosec with first responder techniques.
Getting In - Initial Access - 2023 and Beyond
Explore cutting-edge techniques for gaining initial access in cybersecurity, focusing on creative social engineering methods that bypass modern corporate defenses and email filters.