The Long Con
BSides Winnipeg

Travis - Whose Threat Model is it Anyway?

Mel - Lock it Down: IBM's Keys to Data Security Success

Matias Wengiel - Achieving More by Doing Less - How Burnout Prevention Can Improve Productivity

Gavin Klondike - The Cyberpunks Guide to Attacking and Defending Generative AI

GlitchWitch - Real-world Vulnerabilities (and how to exploit them)

Adam - MTS finds massive RG exploit

Richard Frovarp - A Survey of OAuth, OIDC, and Verifiable Credentials (Wallets)

Mike Himbeault - Sideload this!

David Dyck - Zeroconf Networking - Abuses, Implementations, and Other Malarkey

Brent King - Threat Hunting, Tracking Your Adversaries

Adam Thompson - Networking I Wish Security People Understood

Paul Harrison - Opulent Alerting: Enriching Our Lives

Rob Keizer - Introduction to global anycast using OpenBSD (on a budget)

St34lthy_fox - AI-Assisted Social Engineering in Cyber Warfare

Mike Saunders - Hiding in Plain Sight

Mat - LOWC2 - Living Off the Web C2

Matir - Badgelife Creator 101: Making Your First Electronic Badge

Oleksiy Vasylyuk - Unlocking a Secure Future via Test-Driven Delivery

Jared Bater - Adventures in Agricultural IoT

Richard Frovarp - How SSO Works

Paul Harrison - Transparency in Security

GlitchWitch - SaaS Security Basics on a Shoestring Budget

Mike Saunders - Roll for Stealth: Intro to AV & EDR Evasion

Travis Friesen - Logging: you're not doing it enough

Raph - SYSMON + ATT&CK to feed your SIEM

William Franzin - Reverse-Engineering & Re-Purposing Smart Devices

Mike Himbeault - The Ancestry of Kubernetes

Rob Keizer - pledge, and why you should use it

Mark Jenkins - The Security Implications of Ansible Scared Me

Sarah LaCroix - Do I Need To Be Worrying About Security Updates For My Car????