.e”X”es and “O”auths (They Haunt Me): An In-Depth Analysis of OAuth & OIDC Misconfigurations and Token Replay Attack Gallery .e”X”es and “O”auths (They Haunt Me): An In-Depth Analysis of OAuth & OIDC Misconfigurations and Token Replay Attack 2025 Talks - 50 Minutes Presented by Darryl G. Baker
Cyber Werewolves Among Us: Building Threat Intel Programs That Fit & Defend Your Org Gallery Cyber Werewolves Among Us: Building Threat Intel Programs That Fit & Defend Your Org 2025 Talks - 50 Minutes Presented by CyberRoxey Davis
Ensuring Data Integrity in Incident Response: Tools and Techniques for Forensically Sound Log Extraction Gallery Ensuring Data Integrity in Incident Response: Tools and Techniques for Forensically Sound Log Extraction 2025 Talks - 50 Minutes Presented by Colin Meek
You Need a Jay-z and a Beyoncé: How Sponsors and Mentors Can Supercharge Your Career in Cybersecurity Gallery You Need a Jay-z and a Beyoncé: How Sponsors and Mentors Can Supercharge Your Career in Cybersecurity 2025 Talks - 50 Minutes Presented by Anthony Hendricks
Ransomware Rampage: Gamifying Your Incident Response Playbook Gallery Ransomware Rampage: Gamifying Your Incident Response Playbook 2025 Talks - 50 Minutes Presented by Anushree Vaidya
SkyScalpel: Making & Breaking {“Policy”: “Obfu0075scA**Tion”} in the Cloud Gallery SkyScalpel: Making & Breaking {“Policy”: “Obfu0075scA**Tion”} in the Cloud 2025 Talks - 50 Minutes Presented by Abian Morina