Hack the Docs: how security professionals use documentation
We write documentation to help our colleagues and users find their way through our systems - but your carefully-crafted documentation can also help attackers learn what your systems do, and give them unintentional pointers on where to start breaking it.
Vampires in the Browser: banishing uninvited Javascript from your web app
There are many sneaky ways that you may find yourself with someone else's Javascript inside your app without realising you've technically allowed it to be there. This talk is here to help you solve this problem.
What We Do in the Shadows
Every organisation's infrastructure has its shadow, the unofficial system of servers, accounts, and hardware that crisscrosses and bypasses the sanctioned pathways. This talk is a space for both confession and redemption: in it, we will delve into the psychology that leads to the development of shadow IT, the opportunities that can grow out of this corporate underground, and how to get these systems out of the shadows and into the light.
How to Disappear Completely
This talk provides an overview of the latest urban camouflage technology and how to deploy it in order to foil facial recognition. We'll dive into the ethics of biometric identification, the way current legislation affects this technology, and what is needed for facial recognition technology to be both useful and just.