Securi-Tay 2017 - Welcome To Securi-Tay
Securi-Tay 2017 - Closing Ceremony
Securi-Tay 2017 - Advanced Attack Detection
Securi-Tay 2017 - Malware in Memory
Pentest Limited Securi-tay 2017 CTF Walkthrough
Securi-Tay 2017 - IoT security from the other side
Securi-Tay 2017 - Ransomware - The battle we will not win
Securi-Tay 2017 - SSL/TLS Hipsterism: Finding implementation bugs outside the mainstream
Securi-Tay 2017 - Adventures – Pentesting Windows Estates
Securi-Tay 2017 - A Window into Ring0
Securi-Tay 2017 - How secure is AngularJS?
Securi-Tay 2017 - Secure (Desktop) Messengers – Usability vs. Security
Securi-Tay V - Blackholing the Internet: A Live Demo
Command Injection with Commix & Burp Suite | EP3 | Securi-Tay 2017 CTF Walkthrough
Securi-Tay V - 8 Security Lessons from 8bit Games
Securi-Tay 2017 - Lightning Talk 3: Mikey Jack
Securi-Tay V -Infosec awareness, training and education - forget the tech, focus on the people!
Securi-Tay V - Red Team Dev Ops
Securi-Tay 2017 - Lightning Talk 2: Jeremie Piguet
Securi-Tay V - DLL Hijacking: The Eighth Circle of Dependency Hell