Track Overview

Security: Red XOR Blue Team

Security from the defender's AND the attacker's point of view


From this track

SESSION + Live Q&A Security

Encryption Without Magic, Risk Mngmnt Without Pain

In-depth technical inquiry about cryptography in a wider context: how it helps to narrow more significant risks to controlled attack surfaces, enables managing the risk efficiently and elegantly, how tools and algorithms sit in a broader context of managing infrastructure-wide risks associated...

Anastasiia Voitova

Head of Customer Solutions, Security Software Engineer @CossackLabs

SESSION + Live Q&A Security

Bigger, Faster and More Secure

Many people don't care about security. It's OK, don't worry! I'm not judging. Security is the world of defense, of caution and of risk. Securing systems is hard and we don't have great solutions to the many challenges it poses. Security folk on the whole are the least exciting people to invite...

Laura Bell

Founder of SafeStack

UNCONFERENCE + Live Q&A Security

Security Open Space

SESSION + Live Q&A Security

Attack Trees, Security Modeling for Agile Teams

Agile software development and security often don’t feel like good bedfellows. Many traditional security methodologies for analysing risk and threats are based on old military or government based software development methodologies which favour traditional, slow moving, low change...

Michael Brunton-Spall

Independent Security Consultant, previously Deputy Director for Technology and Operation, & Head of CyberSecurity of Government Digital Service

SESSION + Live Q&A Security

Security Champions: Only YOU Can Prevent File Forgery

As a Developer, there will come a time when you realize that you have the power to not only ship awesome features, but also protect them so that no one else can tamper with all your hard work. Every Developer is responsible for coding securely, but there are a brave few among us that will take...

Marisa Fagan

Product Security Lead @Synopsys

SESSION + Live Q&A Security

EternalBlue: Exploit Analysis and Beyond

In this presentation we will analyze the EternalBlue exploit that was leaked in early 2017 which was then abused to great effect throughout the year.   Beginning a journey into InfoSec research can be daunting. We will discuss how targeted analysis can help develop security skills while...

Emma McCall

Security Analyst @RiotGames


Speakers from this track

Anastasiia Voitova

Head of Customer Solutions, Security Software Engineer @CossackLabs

Anastasiia is a software engineer with a wide background, she started her career as a mobile developer, then deepen into security engineering. Now she has focused on cryptography/applied security, she helps companies to build secure yet usable systems (oh yes, it takes efforts). Anastasiia...

Read more
Find Anastasiia Voitova at:

Laura Bell

Founder of SafeStack

With almost a decade of experience in software development and information security, Laura Bell specializes in bringing security survival skills, practices, and culture into fast paced organisations of every shape and size. An experienced conference speaker, trainer, and regular panel member,...

Read more

Michael Brunton-Spall

Independent Security Consultant, previously Deputy Director for Technology and Operation, & Head of CyberSecurity of Government Digital Service

Michael Brunton-Spall is an independent Cybersecurity consultant, working for the UK Government.  Michael is a former Deputy Director with the Cabinet Office, where he headed up Technology and Operations for the Government Digital Service as well as being head of Cybersecurity.  Michael...

Read more
Find Michael Brunton-Spall at:

Marisa Fagan

Product Security Lead @Synopsys

Marisa Fagan is the Product Security Lead at Synopsys in SF, US. She works on building security into every phase of the SDLC and empowering developers to not need her. Previously in her career, she has worked as a security culture expert at places like Salesforce, Facebook, Bugcrowd, and Errata...

Read more

Emma McCall

Security Analyst @RiotGames

As a Security Analyst at Riot Games, Emma is responsible for hunting, mitigating and analyzing threats targeting the games industry. She is also active in the security community, avidly following the release of new malware and exploits. Emma has recently produced in-depth analyses of well known...

Read more
Find Emma McCall at:

Track Host

Christina Camilleri

Security Solutions Specialist @@riotgames

Christina Camilleri works on the infosec team at Riot Games where she focuses on improving security awareness training for Rioters, running awareness tests, and making use of data to inform on Rioter behaviors around security. Christina’s primary areas of expertise are web application...

Read more
Find Christina Camilleri at:

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.