These were the speakers at Security Fest 2024.Thanks for helping us make this conference awesome!
In the realm of Application Security, the journey from the 1960s to the present day is a story of remarkable evolution and progress. This keynote presentation aims to embark on an enlightening historical exploration, tracing the trajectory of the...
With the improvements in technology, hackers are also getting equipped with better rigs day by day. For every new technology being developed to secure cyber space, hackers are trying to research various attack vectors to penetrate them, ultimately...
Threat actor tactics in a classic on-premises environment are well documented and understood. For example, extracting credentials from memory and then pass-the-hash is a common technique to move laterally in Windows. But how do threat actors move...
As ESXi virtualization environments face an escalating onslaught of ransomware threats, this presentation draws from experiences gained by Truesec in handling several incidents involving ESXi ransomware, such as Akira, AlphV, and Trigona. The threat...
Explore the dynamic and ever-evolving landscape of artificial intelligence (AI) in the realm of cyber security, focusing on the intricate balance between offensive and defensive strategies. The digital era has ushered in an arms race between AI...
Everything is a subscription with a cost now. Nothing is cheap, either. The services that were supposed to help us out are turning out to be lots of overhead. How do you defend yourself without logs? How can you even tell you're getting attacked? The...
Sadly, Dave Lewis had to cancel his talk due to work. We hope to see him soon again! In the dynamic interplay of cybersecurity, Artificial Intelligence (AI) has emerged as a double-edged sword, wielded by both defenders and attackers. This...
Let me take you on a journey as close to zero day exploit as you can come without being the actual finder of the vulnerability your self. Lets take a closer look at a critical, real world attack from this year affecting around 25 000 sites. From a...
This research delves into the dynamic convergence of telecom and hardware hacking, focusing on vehicular networks and innovative tools. The study reveals vulnerabilities in modern vehicular networks, uncovering covert techniques in telecom hacking and...
While external assessments may pinpoint certain vulnerabilities, the specific details of misconfigurations, unique to each organization, may slip past even the most diligent administrators. During this session, I will stress the crucial importance of...
In a mobile-first world, user registration using only a phone number has become pretty common, this phone number has become the primary method of authentication due to its convenience and speed. These systems may or may not verify other details about...
How to become an Incident Response Rockstar? After conducting hundreds of Incident Response cases, more data is not always better. Focusing on the most relevant forensic data can speed up the investigation process rapidly. In this talk, we will...
Digital identity solutions are on the rise in many countries. Is your identity card stored on your mobile phone in a safe and secure manner? What risks do digital identity solutions pose, and how easily can criminals exploit them? What to look out for...
See all speakers at Security Fest