HOME
ABOUT
TRAINING
CXO CLUB
2021 CXO WORKSHOP
2021 CXO BRIEF
2019 CXO BRIEF
2018 CXO BRIEF
CONFERENCE
2021 CONFERENCE
2021 Schedule
2021 BizComm
2020 CONFERENCE
2019 CONFERENCE
2018 CONFERENCE
CFP
TICKETS
MERCHANDISE
POSTS
More
Use tab to navigate through the menu items.
0
All Posts
Talks
Workshops
Training
Kampung (Village)
CTF
Electronic Badge
Today I Learned
CXO
Search
Infosec In the City (IIC) — 2 Years In & the Future
Catch Me If You Can — Seeing the Red Through the Blue — by Owen Shearing & Will Hunt
Making & Breaking Machine Learning — by Clarence Chio
Linux-Kernel Research For Kernel-Newcomers: Where To Start From? — by Ron Munitz
An Introduction to SAP Forensics — by Jordan Santarsieri
Attacks On GSM — Alarms, Smart Homes & Smartwatches For Kids — by Aleksandr Kolchanov
Real Hardware Hacking For S$30 Or Less (Hands-On) — by Joe FitzPatrick
Do You See What They See? Asset Discovery In the Age of Security Automation — by Isaac Dawson
Office IoT: The Elephant In the Room — by Quentyn Taylor
P@ssword Making & Breaking — by Will Hunt
Body Language Behind Social Engineering Attacks — by Sarka Pekarova
Designing Secure Systems: Value-Driven Threat Modeling — by Avi Douglen
Attacking Offensively For Defense — by Keith Rayle
Speed-Up Recon & Pwn On Bug Bounty? Build Your Own Tool! — by Igor Lyrchikov & Egor Saltykov
Reskinning the Robot: Things I Would Love To Tell My Younger Self — by Quentyn Taylor
The State of AI-Assisted Fuzzing & Program Analysis — by Clarence Chio
Data Breaches: Barbarians In the Throne Room — by Dave Lewis
The Art of Persistence: Lurking Behind the Browser — by Samuel Pua
A Red Team Perspective To Research — by Vincent Yiu
Pwning AWS Cloud Services — by Mohammed Aldoub
1
2