.e”X”es and “O”auths (They Haunt Me): An In-Depth Analysis of OAuth & OIDC Misconfigurations and Token Replay Attack Gallery .e”X”es and “O”auths (They Haunt Me): An In-Depth Analysis of OAuth & OIDC Misconfigurations and Token Replay Attack 2025 Talks - 50 Minutes Presented by Darryl G. Baker
Firewalls and Fire Alarms: What to Do When Your Best Defenses Go Up in Smoke Gallery Firewalls and Fire Alarms: What to Do When Your Best Defenses Go Up in Smoke 2025 Talks - 50 Minutes Presented by Dr. Catherine J. Ullman
Ensuring Data Integrity in Incident Response: Tools and Techniques for Forensically Sound Log Extraction Gallery Ensuring Data Integrity in Incident Response: Tools and Techniques for Forensically Sound Log Extraction 2025 Talks - 50 Minutes Presented by Colin Meek
You Need a Jay-z and a Beyoncé: How Sponsors and Mentors Can Supercharge Your Career in Cybersecurity Gallery You Need a Jay-z and a Beyoncé: How Sponsors and Mentors Can Supercharge Your Career in Cybersecurity 2025 Talks - 50 Minutes Presented by Anthony Hendricks
Ransomware Rampage: Gamifying Your Incident Response Playbook Gallery Ransomware Rampage: Gamifying Your Incident Response Playbook 2025 Talks - 50 Minutes Presented by Anushree Vaidya
“SkyScalpel: Making & Breaking {“Policy”: “Obfu0075scA**Tion”} in the Cloud” with Abian Morina Gallery “SkyScalpel: Making & Breaking {“Policy”: “Obfu0075scA**Tion”} in the Cloud” with Abian Morina 2025 Talks - 50 Minutes Presented by Abian Morina
Inboxfuscation: 𝓞ut-of-the-Box Mailbox 𝓞bf{\u}scation – Turning BEC into Business Email Chaos Gallery Inboxfuscation: 𝓞ut-of-the-Box Mailbox 𝓞bf{\u}scation – Turning BEC into Business Email Chaos 2025 Talks - 50 Minutes Presented by Andi Ahmeti