-
Mattias Wadenstein (NeIC)27/06/2023, 10:00Talks
Welcome, and a brief rundown of practical matters and the rough schedule.
Go to contribution page -
Leif Nixon (Nixon Security)27/06/2023, 10:10Talks
Cyber Warfare is a pretty vague concept. Often it is used intentionally vaguely, because it is a good way to get funding. It is a big, scary phrase. Our Cyber Warriors need umpteen millions to Cyber Defend the nation against Cyber Warfare.
But what does it mean in practice? How could you hack a country? How would I hack a country? We will discuss real-life attacks and vulnerabilities,...
Go to contribution page -
Mr James Bore27/06/2023, 10:55Talks
Risk management is at the core of what we do in security, and yet is used as much of an excuse not to pursue security as to follow it.
This talk will look at removing likelihood from the risk management equation and taking a whole new approach in communicating risk. Instead of heatmaps or four by four boxes, we will look at assessing risks through scenario exercises to determine if the...
Go to contribution page -
Mr Klaus Agnoletti27/06/2023, 11:40Talks
I was diagnosed with AD(H)D almost three years ago, aged 44. Getting the diagnosis and being able to get proper medicine meant the world to me; suddenly I understood all those symptoms and I was able to function remarkably better. Better understanding also meant that I got more insight to why it was becoming increasingly harder for me to get and keep a job. So something had to happen.
Go to contribution page
I’ve... -
Alexandre Bartel (Umeå University), Mr Glenn Jansson27/06/2023, 13:00Talks
Deserialization is a technique based on rebuilding instances of objects from a byte stream. It can open applications to attacks such as remote code execution (RCE) if the data to deserialize originates from an untrusted source. Deserialization vulnerabilities are so critical that they are in OWASP’s list of top 10 security risks for web applications. This is mainly caused by unwise decisions...
Go to contribution page -
Markus Örebrand (OWASP)27/06/2023, 13:45Talks
From it's inception in the nineties where threat modeling was an artifact-heavy beast and mostly used as a formality, the method is now a light-weight conversation and design tool used directly by the development teams.
In this session I will show you how you can lead your team to new insights about the system you're building and an understanding of the surrounding threat landscape, using...
Go to contribution page -
Jens Bohlin (Tutus Data)27/06/2023, 15:15Talks
The development of quantum computers has gain increased attention over the
last years, not least because of this year's Nobel Prize in Physics.
Quatum computers are often portrayed as a major threat against modern crypto
system and therefore also a threat against fundamental
security mechanisms that we all depend on in our modern connected world.In this talk, we will learn how quantum...
Go to contribution page -
Linus Lagerhjelm (Omegapoint)27/06/2023, 16:15Talks
Hur kan du bevisa att du är du? Hur kan du bevisa att du tagit en viss examen från ett visst universitet? Hur gör du detta i en digital kontext, där du inte ens träffar din motpart? Hur kan du veta att du kan lita på äktheten av ett digitalt dokument? Och hur kan du göra allt detta helt anonymt?
I denna föreläsning kommer jag berätta om ett knippe tekniker som besvarar alla ovanstående...
Go to contribution page -
Mattias Wadenstein (NeIC)27/06/2023, 17:00
Choose timezone
Your profile timezone: