{"$schema": "https://c3voc.de/schedule/schema.json", "generator": {"name": "pretalx", "version": "2025.2.2"}, "schedule": {"url": "https://speak.enusec.org/le-tour-du-hack-2026/schedule/", "version": "0.3", "base_url": "https://speak.enusec.org", "conference": {"acronym": "le-tour-du-hack-2026", "title": "Le Tour Du Hack", "start": "2026-05-16", "end": "2026-05-17", "daysCount": 2, "timeslot_duration": "00:05", "time_zone_name": "UTC", "colors": {"primary": "#50a8b7"}, "rooms": [{"name": "Track 1", "slug": "1-track-1", "guid": "8f5bd460-577f-5f3b-9ab6-190193033ebd", "description": null, "capacity": 200}, {"name": "Track 2", "slug": "2-track-2", "guid": "113a33f9-a656-5f72-a05f-94d90f37c5b4", "description": null, "capacity": 50}, {"name": "Track 3", "slug": "3-track-3", "guid": "e5c71772-3e94-57cf-90af-d54d1b671dd0", "description": null, "capacity": 50}], "tracks": [], "days": [{"index": 1, "date": "2026-05-16", "day_start": "2026-05-16T04:00:00+00:00", "day_end": "2026-05-17T03:59:00+00:00", "rooms": {"Track 1": [{"guid": "495c7cfb-d474-54b4-b827-4fe703632b20", "code": "9W78TE", "id": 32, "logo": null, "date": "2026-05-16T09:00:00+00:00", "start": "09:00", "duration": "00:45", "room": "Track 1", "slug": "le-tour-du-hack-2026-32-registration-opens", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/9W78TE/", "title": "Registration opens", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "Registration opens at this time", "description": "", "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/9W78TE/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/9W78TE/", "attachments": []}, {"guid": "f0d301fe-129c-59fa-a987-e571a8fdbf05", "code": "YS3HC9", "id": 25, "logo": null, "date": "2026-05-16T09:45:00+00:00", "start": "09:45", "duration": "00:15", "room": "Track 1", "slug": "le-tour-du-hack-2026-25-opening-remarks", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/YS3HC9/", "title": "OPENING REMARKS", "subtitle": "", "track": null, "type": "Lighting Talk", "language": "en", "abstract": "Opening remarks, does what it says on the tin...", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "CRXUMY", "name": "Team ENUSEC (Connor, Scott, Lewis, Xander & Eden)", "avatar": null, "biography": "This year's ENUSEC committee;\r\n\r\nConnor - President\r\nScott - Vice President\r\nLewis - Secretary\r\nXander - Treasurer\r\nEden - Media Officer", "public_name": "Team ENUSEC (Connor, Scott, Lewis, Xander & Eden)", "guid": "84c53436-2501-5e1d-bc97-0920d467c55d", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/CRXUMY/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/YS3HC9/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/YS3HC9/", "attachments": []}, {"guid": "f5e0d24a-9ba4-577a-9d9a-087a681d9cd4", "code": "BDHGW8", "id": 27, "logo": null, "date": "2026-05-16T10:00:00+00:00", "start": "10:00", "duration": "00:30", "room": "Track 1", "slug": "le-tour-du-hack-2026-27-keynote-history-s-blueprint-for-cyber-resilience", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/BDHGW8/", "title": "KEYNOTE - History\u2019s Blueprint for Cyber Resilience", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "How do you build cyber resilience when everything is moving fast? This keynote explores engineering thinking, human judgement and designing systems that can be trusted when the stakes are high.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "QU3MXT", "name": "Gemma Barrow", "avatar": null, "biography": "Gemma Barrow is a Lead Detection & Response Engineer at Lloyds Banking Group, having joined the organisation 15 years ago via the Group\u2019s graduate programme. She is a Mathematics with French graduate from the University of St Andrews and has spent the past eight years in security roles, now leading a detection and response engineering team.", "public_name": "Gemma Barrow", "guid": "82223930-bc46-5233-b274-640766aaeacf", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/QU3MXT/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/BDHGW8/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/BDHGW8/", "attachments": []}, {"guid": "56f79bee-4fa0-53f1-ba48-1ea5248b802b", "code": "S73CHT", "id": 5, "logo": null, "date": "2026-05-16T10:30:00+00:00", "start": "10:30", "duration": "01:00", "room": "Track 1", "slug": "le-tour-du-hack-2026-5-automating-chaos-at-scale", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/S73CHT/", "title": "Automating Chaos at Scale", "subtitle": "", "track": null, "type": "Long Talk", "language": "en", "abstract": "What happens when you stop treating AI like a chatbot and start treating it like an execution engine and give it access to untapped ADHD?", "description": "This talk explores how to weaponise AI for rapid idea-to-tool pipelines taking half-formed, borderline chaotic ideas and turning them into working tools, side projects, and offensive experiments at speed. Not polished SaaS. Not over-engineered platforms. Building chaos at scale.\r\n\r\nI\u2019ll walk through how AI can be used to:\r\n\t\u2022\tBreak past the \u201cI\u2019ll build that someday\u201d backlog\r\n\t\u2022\tPrototype tools in hours instead of weeks\r\n\t\u2022\tExplore unconventional or \u201cbad\u201d ideas safely and quickly\r\n\t\u2022\tChain together automation, code generation, and testing loops\r\n\t\u2022\tValidate whether something is genuinely useful or just noise\r\n\r\nAlong the way, I\u2019ll look at real examples of AI-assisted builds: from scrappy utilities to fully functional tooling that would never have existed without lowering the barrier to execution.\r\n\r\nThis isn\u2019t about replacing developers. It\u2019s about removing friction and what happens when that friction disappears.", "recording_license": "", "do_not_record": true, "persons": [{"code": "AELZZ8", "name": "Andy Gill", "avatar": null, "biography": "Andy Gill is an adversarial architect and offensive security practitioner with a focus on adversary emulation, tradecraft realism, and intelligence-led operations. His work centres on replicating real-world attacker behaviour using native tooling, proxy disapline, and low-footprint techniques rather than traditional payload-heavy approaches.", "public_name": "Andy Gill", "guid": "8283ade7-0766-5100-9aff-242ff32712a4", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/AELZZ8/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/S73CHT/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/S73CHT/", "attachments": []}, {"guid": "28027b77-d73a-59cb-bd03-ab397d5a4e0c", "code": "BMXMF8", "id": 8, "logo": null, "date": "2026-05-16T11:40:00+00:00", "start": "11:40", "duration": "00:30", "room": "Track 1", "slug": "le-tour-du-hack-2026-8-how-does-ai-geopolitics-impact-on-the-cyber-landscape-what-can-you-do-to-hack-your-brain-for-a-resilient-career", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/BMXMF8/", "title": "How does AI, Geopolitics impact on the cyber landscape ? What can you do to \u201chack\u201d your brain for a resilient career !", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "We will explore the AI landscape, geopolitical challenges and how that impacts your career ! AI bubble (or not ?) will be contextualised in the face a continuous change to provide an opportunity to look at the horizon skills for the future (harder to predict than you think) !\r\n \r\nJames will demonstrate how he has pivoted his skills in a continuous learning path to ensure relevance to the market needs throughout his career.\r\nWe will explore the geopolitical situation and what it means for individuals and the challenges for a resilient cyber society\r\nLearnings   \r\nAI and the geopolitical landscape trends and the potential impact on your career.\r\nHow to develop and maintain your personal resilience in the new evolving landscape.", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"code": "LVCV9C", "name": "James K.", "avatar": "https://speak.enusec.org/media/avatars/LVCV9C_DKaUZuB.webp", "biography": "Personal bio\r\nCurrently a cyber operations manager at Lloyds banking group, former CISO and Global DPO, James is a recognised expert in his field, having worked in AI, simulation, energy and financial services for several blue-chip companies. He has managed and mitigated cyber security incidents since 2007 and has set up and led incident response and threat intelligence teams.  He has in depth knowledge of Geopolitics actively participating in professional groups. An active contributor to the MITRE Center for Threat Informed Defense, he is president of ISC2 Scotland and has won several prizes and accolades for his contributions to the cyber security field \u2013 helping other professional succeed in their careers, by mentoring.", "public_name": "James K.", "guid": "e0556836-b0fc-59c6-bc01-98576aaf7473", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/LVCV9C/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/BMXMF8/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/BMXMF8/", "attachments": []}, {"guid": "d8881e74-f8f5-5344-8c73-7e4d930f6e50", "code": "N3Z8CW", "id": 7, "logo": null, "date": "2026-05-16T12:40:00+00:00", "start": "12:40", "duration": "00:30", "room": "Track 1", "slug": "le-tour-du-hack-2026-7-panel-discussion-what-it-s-really-like-to-work-in-cyber-security-in-a-large-organisation", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/N3Z8CW/", "title": "Panel Discussion - What it\u2019s really like to work in cyber security in a large organisation?", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "Featuring panellists from Lloyds, this panel discussion will be on working in cyber in large organisations. What is it really like?", "description": "", "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/N3Z8CW/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/N3Z8CW/", "attachments": []}, {"guid": "4bc8afaf-edd2-587b-80ed-c15e49653f07", "code": "Z9VD7V", "id": 16, "logo": "https://speak.enusec.org/media/le-tour-du-hack-2026/submissions/Z9VD7V/work_photo_ykSGise_Lf3KQBG.webp", "date": "2026-05-16T13:10:00+00:00", "start": "13:10", "duration": "00:30", "room": "Track 1", "slug": "le-tour-du-hack-2026-16-securing-atms-101", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/Z9VD7V/", "title": "Securing ATMs: 101", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "Join Kerry Archibald for an enlightening talk on securing ATMs in the real world. Drawing on over a decade of experience, this session discusses 15 essential rules for ATM security, debunks persistent industry misconceptions, and examines how criminal groups actually attack machines in practice. Kerry also tackles one of the toughest problems defenders face: why proven protections so often go unapplied.", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"code": "WN8HCN", "name": "Kerry Archibald", "avatar": "https://speak.enusec.org/media/avatars/WN8HCN_1rp7QKa.webp", "biography": "Kerry Archibald is a security consultant with over 12 years of experience in the ATM industry, where her career has been consistently focused on security products and solutions. She began in ATM software support, building strong operational expertise before transitioning into security engineering, a role she has held for the past five years. Kerry now works primarily as a consultant, helping organisations secure their ATM estates, advising on protective controls, and investigating fraud incidents to address real\u2011world threats. Alongside her technical career, she has spent five years as a board member of a women\u2019s career development group, supporting mentoring, coaching, and initiatives that provide colleagues with meaningful career development opportunities.", "public_name": "Kerry Archibald", "guid": "66a3475a-a657-5a35-a6c4-467dd4fb61de", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/WN8HCN/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/Z9VD7V/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/Z9VD7V/", "attachments": []}, {"guid": "73a4d24a-f01d-5a95-bcb4-8d6ee260c77a", "code": "EEMPKG", "id": 21, "logo": null, "date": "2026-05-16T13:40:00+00:00", "start": "13:40", "duration": "00:30", "room": "Track 1", "slug": "le-tour-du-hack-2026-21-ghosts-in-the-cluster-hiding-in-kubernetes-for-years", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/EEMPKG/", "title": "Ghosts in the Cluster - Hiding in Kubernetes for Years", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "You've popped a Kubernetes cluster. You've got admin creds. Now the real question is how do you stay? Kubernetes abstracts away enormous complexity across multiple layers, from container runtimes to cluster APIs and each of those layers has dark corners where an attacker can set up shop and go unnoticed for months or even years.\r\n\r\nThis talk is a post-exploitation deep dive into Kubernetes persistence. We'll walk through a compromised cluster layer by layer, demonstrating how attackers can escape to cluster nodes, spin up containers invisible to kubectl, abuse the Kubelet API to dodge audit logging and admission control, and create phantom credentials that survive long after the initial breach is forgotten. If defenders aren't watching every layer of the stack, they won't see you coming, or going.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "JSVBRW", "name": "Rory McCune", "avatar": "https://speak.enusec.org/media/avatars/JSVBRW_OBUqdHJ.webp", "biography": "Rory has worked in the cyber security arena for the last 26 years in a variety of roles. These days he spends his work time on container and cloud native security as a senior security researcher and advocate for Datadog. He is an active member of the container security community having delivered presentations at a variety of conferences including RSA and OWASP Appsec EU. He has also presented at major security and containerization conferences and is an author of the CIS Benchmarks for Docker and Kubernetes and member of Kubernetes SIG-Security.", "public_name": "Rory McCune", "guid": "932130e0-eda6-5fff-8661-5e8540b58106", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/JSVBRW/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/EEMPKG/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/EEMPKG/", "attachments": []}, {"guid": "5fcfe59b-3875-5ff9-824c-088f3f8f28eb", "code": "DNQMKH", "id": 20, "logo": null, "date": "2026-05-16T14:20:00+00:00", "start": "14:20", "duration": "00:30", "room": "Track 1", "slug": "le-tour-du-hack-2026-20-the-ecrime-ecosystem-how-cybercriminals-operate-and-how-we-track-them", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/DNQMKH/", "title": "The eCrime Ecosystem: How Cybercriminals Operate and How We Track Them", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "I would like to propose a talk exploring the broader cybercriminal ecosystem, drawing on my experience as an Intelligence Analyst at CrowdStrike. The talk will introduce key concepts in Cyber Threat Intelligence (CTI) and how analysts use it to track and understand adversary behaviour, before exploring how eCrime operates as a structured, business-like underground economy. During the session I will focus on real threat actors I track in my day-to-day work, offering attendees a rare, practitioner-level insight into how adversaries operate at scale. I believe CTI remains an underrepresented career path in the industry, and I hope this talk will inspire students \u2014 particularly those drawn to analytical rather than purely technical roles \u2014 to consider it as a rewarding and exciting avenue within cyber security.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "ECFGNZ", "name": "David Rowney", "avatar": null, "biography": "I am a Cyber Threat Intelligence Analyst working for CrowdStrike. I studied Cyber Security and Forensics at Edinburgh Napier University and graduated in September 2024. I had an internship in my third year with CrowdStrike, who offered me a full-time position post-graduation while I was at university, and I have been working there ever since.", "public_name": "David Rowney", "guid": "289ccc92-59a0-578b-8ede-d3af3ce77a0c", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/ECFGNZ/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/DNQMKH/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/DNQMKH/", "attachments": []}, {"guid": "317e1c6d-b587-5cd0-8244-c6d6fd76b5e8", "code": "VHZED7", "id": 24, "logo": null, "date": "2026-05-16T14:50:00+00:00", "start": "14:50", "duration": "01:00", "room": "Track 1", "slug": "le-tour-du-hack-2026-24-meet-the-fixers-how-one-social-engineering-technique-spawned-a-family-and-how-to-catch-it", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/VHZED7/", "title": "Meet the Fixers: How One Social Engineering Technique Spawned a Family  and How to Catch It", "subtitle": "", "track": null, "type": "Long Talk", "language": "en", "abstract": "Last year at LTDH I did a talk on ClickFix \u2014 the fake-CAPTCHA trick that gets users to paste malicious commands into the Run dialog. I thought I was done with the topic.\r\n\r\nA year on, ClickFix has grown a family. FileFix moves the trick to File Explorer. ConsentFix (APT29) does it through OAuth and bypasses MFA and passkeys without ever touching the endpoint. CrashFix deliberately breaks your browser, then offers the fix. And a DPRK-nexus actor used a ClickFix-style fake job interview to compromise an Axios maintainer putting 100M weekly npm downloads in the blast radius.\r\n\r\nPart one: how the family grew up. Part two: how we catch them \u2014 SIEM queries, Conditional Access, browser hardening, the lot. Part three: why none of this stays solved, because custom ClickFix GPTs and AI-generated lures are about to make the next variant cheaper than the last.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "BDT978", "name": "Cameron Cottam", "avatar": null, "biography": "SecOps Analyts Baillie Gifford", "public_name": "Cameron Cottam", "guid": "903681ad-3325-5307-8809-77d140663479", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/BDT978/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/VHZED7/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/VHZED7/", "attachments": []}, {"guid": "fafde251-b755-5966-b72b-0a5f3c517512", "code": "NNBFMC", "id": 22, "logo": null, "date": "2026-05-16T15:50:00+00:00", "start": "15:50", "duration": "00:30", "room": "Track 1", "slug": "le-tour-du-hack-2026-22-the-nightmare-before-christmas", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/NNBFMC/", "title": "The Nightmare before Christmas", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "Do hackers take holidays? Join me as I discuss a real DFIR incident where a employees brand new device is compromised via SEO poisoning, and find out how Christmas saved a company from a full-scale ransomware attack!", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "UWCJDG", "name": "Samantha Varley", "avatar": "https://speak.enusec.org/media/avatars/UWCJDG_tpRRtEz.webp", "biography": "My name is Samantha Varley and I graduated with a first class honours in Cybersecurity and Digital Forensics at Edinburgh Napier in 2022. During that time was COVID so I did most of my degree from home, while also driving buses in West Lothian part time. I now work as a CSIRT Analyst at Orange Cyberdefense where I have been since I graduated. In my almost 4 years at OCD I have been exposed to a wide variety of attackers and silliness. I love cats, I have two rescues who regularly interrupt my work calls! I love to play games and build Lego in my spare time, as well as the occasional spin on my mountain bike (MTB).", "public_name": "Samantha Varley", "guid": "5651933b-99eb-532d-bf09-5bc34ce4f90b", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/UWCJDG/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/NNBFMC/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/NNBFMC/", "attachments": []}, {"guid": "3cd89640-e55a-5900-ae4b-d9a3e7e3fe47", "code": "Z9MJ8X", "id": 2, "logo": null, "date": "2026-05-16T16:20:00+00:00", "start": "16:20", "duration": "01:00", "room": "Track 1", "slug": "le-tour-du-hack-2026-2-hot-singles-in-your-area-want-your-session-tokens", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/Z9MJ8X/", "title": "Hot Singles In Your Area Want Your Session Tokens", "subtitle": "", "track": null, "type": "Long Talk", "language": "en", "abstract": "A live demonstration of modern BEC attacks, MFA bypass, and how attackers monetise trust.", "description": "We\u2019re going to log into someone else\u2019s email account - and they\u2019re going to help us do it! From phishing to MFA bypass to session hijacking, this session walks through a real-world BEC attack chain end-to-end.\r\n\r\nThen we ruin the attacker\u2019s day by showing exactly how to stop it.", "recording_license": "", "do_not_record": false, "persons": [{"code": "ZVT77K", "name": "Michael Varley", "avatar": "https://speak.enusec.org/media/avatars/ZVT77K_5gH2fQK.webp", "biography": "Mike Varley is a DFIR analyst who professionally investigates cyber incidents and unprofessionally enjoys recreating them for educational purposes. With experience across SOC and incident response, he\u2019s spent years tracking how attackers turn a single phish into a very bad day.\r\n\r\nHe specialises in translating chaos into something defenders can actually use - with minimal jargon and maximum \u201coh no.\u201d", "public_name": "Michael Varley", "guid": "dadb2d7c-f9f4-5579-b0cf-57d72f8af369", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/ZVT77K/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/Z9MJ8X/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/Z9MJ8X/", "attachments": []}, {"guid": "f8d3f7d9-a0ef-5d46-ba10-d10c17a350d7", "code": "GBRHXN", "id": 11, "logo": null, "date": "2026-05-16T17:20:00+00:00", "start": "17:20", "duration": "00:30", "room": "Track 1", "slug": "le-tour-du-hack-2026-11-no-signature-no-problem-detecting-the-coming-0-day-flood", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/GBRHXN/", "title": "No Signature, No Problem: Detecting the Coming 0-Day Flood", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "AI models like Mythos are finding exploitable vulnerabilities faster than the industry can disclose, patch, or write signatures for them. The inevitable consequence: a flood of 0-days in the wild. Every signature-based detection you own is, by definition, blind to them. This talk makes the case that statistical anomaly detection is no longer an optional \"ML in security\" side quest. It's the only class of detection that can catch the exploitation of things nobody knows exist yet. Drawing on production experience building ML detection, we'll cover what works, what doesn't, and why your UEBA tab isn't going to save you.", "description": "Detection engineering has always been a race: find a vuln, reverse the exploit, write a signature, push it out, hope you beat the attackers. That race was losing even before automation. With AI-driven vulnerability discovery, the race is over. The discovery rate is about to dwarf the signature-authoring rate by orders of magnitude, and a meaningful fraction of those findings will be weaponised before any defender has them.\r\nThat leaves one brute mathematical fact: you cannot write a signature for something you don't know exists. The only detection strategy that survives this world is one that looks for the effects of exploitation rather than its fingerprints. Statistical anomaly detection.\r\nIn this talk we'll cover:\r\n\r\nThe supply-side economics of AI vuln discovery, and why 0-day proliferation is structurally inevitable rather than speculative\r\nWhy signature-based detection breaks down in this regime, with numbers\r\nWhat \"anomaly detection\" actually means (time-series, graph, distribution-based), and the crucial distinctions most vendors blur\r\nReal examples: detections that caught novel behaviour in production vs. the ones that generated 400 alerts a day\r\nThe analyst UX problem: explainability, triage, and why most ML detections die in the SOC\r\nA pragmatic starting point for teams without a PhD on staff\r\n\r\nThis is a hardened follow-up to a talk given at Cyber Scotland Connect in 2025, updated for a world where vulnerability discovery itself has been automated.", "recording_license": "", "do_not_record": false, "persons": [{"code": "T7GEGU", "name": "Aidan McLaughlin", "avatar": "https://speak.enusec.org/media/avatars/T7GEGU_DrGp02X.webp", "biography": "I'm a detection engineer based in Glasgow and a former Principal Security Engineer at Oracle. I've spent the last seven years working across banking, enterprise, and startup security teams, and currently lead detection at Alpha Level, an ML threat detection startup, alongside independent consulting work. I'm mostly drawn to the parts of security operations that don't have tidy answers yet.", "public_name": "Aidan McLaughlin", "guid": "37024035-f731-5b40-8576-13f063560283", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/T7GEGU/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/GBRHXN/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/GBRHXN/", "attachments": []}, {"guid": "538821fd-fa00-5f97-b840-89b9ae822e23", "code": "JEDJGG", "id": 26, "logo": null, "date": "2026-05-16T17:50:00+00:00", "start": "17:50", "duration": "00:15", "room": "Track 1", "slug": "le-tour-du-hack-2026-26-closing-remarks", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/JEDJGG/", "title": "CLOSING REMARKS", "subtitle": "", "track": null, "type": "Lighting Talk", "language": "en", "abstract": "The remarks that close", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "CRXUMY", "name": "Team ENUSEC (Connor, Scott, Lewis, Xander & Eden)", "avatar": null, "biography": "This year's ENUSEC committee;\r\n\r\nConnor - President\r\nScott - Vice President\r\nLewis - Secretary\r\nXander - Treasurer\r\nEden - Media Officer", "public_name": "Team ENUSEC (Connor, Scott, Lewis, Xander & Eden)", "guid": "84c53436-2501-5e1d-bc97-0920d467c55d", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/CRXUMY/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/JEDJGG/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/JEDJGG/", "attachments": []}, {"guid": "787bc84e-7844-5b36-9b13-85a7149a9a85", "code": "T3RRT7", "id": 33, "logo": null, "date": "2026-05-16T18:30:00+00:00", "start": "18:30", "duration": "01:00", "room": "Track 1", "slug": "le-tour-du-hack-2026-33-afterparty", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/T3RRT7/", "title": "AFTERPARTY", "subtitle": "", "track": null, "type": "Long Talk", "language": "en", "abstract": "At this time, the afterparty at the Fountainbridge Fox will begin. 18+ only, have wristbands ready", "description": "", "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/T3RRT7/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/T3RRT7/", "attachments": []}], "Track 2": [{"guid": "4f04d3cb-1ce3-5cbf-b688-b0c8b28580e9", "code": "FEEBJU", "id": 13, "logo": null, "date": "2026-05-16T11:40:00+00:00", "start": "11:40", "duration": "00:30", "room": "Track 2", "slug": "le-tour-du-hack-2026-13-you-ve-been-ph0ned-how-attackers-compromise-organisations-via-telephone-social-engineering", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/FEEBJU/", "title": "You\u2019ve Been Ph0ned: How Attackers Compromise Organisations Via Telephone Social Engineering", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "While organizations spent years training users against email phishing, attackers quietly perfected vishing attacks that bypass MFA and turn helpful helpdesk staff into unwitting accomplices - causing billions in damages across retail, automotive, and gaming industries. This talk combines real red-team war stories with a live AI voice cloning demo to show how modern vishing works and what defences actually stop it.", "description": "While just about everyone has trained users not to click suspicious emails, attackers have quietly moved to the channel nobody prepared for: the phone. From retail giants and luxury brands to automotive manufacturers and casino operators - all have suffered massive financial damages from attacks that started with something as simple as a phone call.\r\nDrawing from real world red teaming engagements, Luiz will walk through the modern vishing playbook: how attackers research targets, craft believable pretexts, pressure helpdesks into breaking their own security policies, and bypass multi factor authentication that was supposed to end credential theft.\r\nThe talk includes a live AI voice cloning demonstration, honest discussion of the ethical challenges in realistic social engineering testing, and practical defences that go beyond \"just be suspicious of phone calls\".", "recording_license": "", "do_not_record": true, "persons": [{"code": "FPYGYR", "name": "Luiz S", "avatar": "https://speak.enusec.org/media/avatars/FPYGYR_vm53QSL.webp", "biography": "Luiz leads the Offensive Security practice at Bridewell and has 2 decades of experience as a penetration tester, red team manager and leader.\r\nHe is a Chartered Cyber Security Professional (ChCSP), holds an MSc in Information Security from Royal Holloway along with various industry certifications.\r\nLuiz has a particular interest in user-driven attacks, and leveraging social engineering to bypass technical controls.", "public_name": "Luiz S", "guid": "bc028890-e4a1-5e81-811b-f44d54502e39", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/FPYGYR/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/FEEBJU/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/FEEBJU/", "attachments": []}, {"guid": "9bbd6ed0-2dcf-5c8d-8054-88f7e29d486b", "code": "FZX9DN", "id": 4, "logo": null, "date": "2026-05-16T13:10:00+00:00", "start": "13:10", "duration": "00:30", "room": "Track 2", "slug": "le-tour-du-hack-2026-4-the-dark-sorcery-of-video-encoding", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/FZX9DN/", "title": "The Dark Sorcery of Video Encoding", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "This is a story all about how video takes up WAY more data than you think, a bit of history, and a dive into how we play with quality, motion vectors and even how our eyes perceive colour to compress it.", "description": "Video takes up a LOT of data. Each pixel is 3 bytes if you're only using 8 bit colour and the numbers get wild as resolution, framerate and bit depth goes up.\r\n\r\nHow does video encoding work in general? What improvements have we seen throughout history? Could the planet's infrastructure survive a world without video compression? Should you maybe use GPU encoding for your video projects? (Spoiler: Yes)\r\n\r\nTime to dig into one of those things we never even think about, let alone take for granted - Video encoding.", "recording_license": "", "do_not_record": false, "persons": [{"code": "CMKL78", "name": "Del Angel Stormreul", "avatar": null, "biography": "Former ENUSEC president, tinkerer (breaker) of many devices, that one idiot with the LED jacket collar.\r\nI got a First Class Honours BEng in Computing from Napier and I'm using it to make computers do janky and relatively insecure things.", "public_name": "Del Angel Stormreul", "guid": "48664703-811f-5a52-8cd4-a01a6925d900", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/CMKL78/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/FZX9DN/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/FZX9DN/", "attachments": []}, {"guid": "c3c7d148-426f-54a9-bbdb-0fefa976ca77", "code": "SAGKR7", "id": 19, "logo": null, "date": "2026-05-16T13:40:00+00:00", "start": "13:40", "duration": "00:15", "room": "Track 2", "slug": "le-tour-du-hack-2026-19-not-just-tech-the-people-and-politics-of-cyber", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/SAGKR7/", "title": "Not Just Tech: The People and Politics of Cyber", "subtitle": "", "track": null, "type": "Lighting Talk", "language": "en", "abstract": "Short overview of the importance of breaking out of a purely technical silo to examine the policy and human factors that play an increasing role in cybersecurity", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "HACCPX", "name": "Imogen McCall", "avatar": "https://speak.enusec.org/media/avatars/HACCPX_EiQOg2B.webp", "biography": "Imogen is a second year studying  Interdisciplinary Futures at the University of Edinburgh. She is interested in cyber policy and using a humanities perspective to improve cybersecurity. Recently Imogen  competed in the of the Cyber Leaders Challenge. Within her team she focused on geopolitical and human factors and made it to the semifinal of the competition.", "public_name": "Imogen McCall", "guid": "a4078174-4eef-509e-be7a-006a0e7952f4", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/HACCPX/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/SAGKR7/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/SAGKR7/", "attachments": []}, {"guid": "4860c5af-d4b2-5e68-b188-4383e36856bf", "code": "TYSGCW", "id": 15, "logo": null, "date": "2026-05-16T14:20:00+00:00", "start": "14:20", "duration": "00:30", "room": "Track 2", "slug": "le-tour-du-hack-2026-15-testing-what-the-scanner-missed-a-bug-bounty-perspective", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/TYSGCW/", "title": "Testing What the Scanner Missed: A Bug Bounty Perspective", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "I have been doing bug bounties for like 6 years now. I have seen most of the people use the scanners to find the issues however those scanners are not that much effective. As someone who has worked as a security expert for six years, I would say that the most interesting exploits are those that cannot be detected through any scanners. The subject of this lecture is manual testing where you go through the application to find the issues in it by yourself that where you find the most interesting stuff which the scanners can't", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "B8HWBQ", "name": "Suresh Aydi", "avatar": "https://speak.enusec.org/media/avatars/B8HWBQ_BrdA59I.webp", "biography": "Security Researcher and Bug Bounty Hunter with 6 years of experience hunting vulnerabilities across web applications.\r\n\r\n- **HackerOne Top 16 with around 1,000 reported vulnerabilities**\r\n- **2nd place finisher at the HackerOne Ambassador World Cup**\r\n- **Invited participant at the HackerOne live hacking event H1-702 2022, H1-702 2023, H1-4420 2023**\r\n\r\nMy approach is simple do manual testing \u2014 go deeper than everyone else, read what others skip, and test what others assume is safe.\r\n\r\nYou can connect with me  on X: **@_xploiterr**", "public_name": "Suresh Aydi", "guid": "aaef2ef2-2f1a-525d-a95e-de8ecea85cf7", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/B8HWBQ/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/TYSGCW/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/TYSGCW/", "attachments": []}, {"guid": "7e64b029-e060-5e68-b91e-2852f516b649", "code": "QS9WQH", "id": 9, "logo": null, "date": "2026-05-16T14:50:00+00:00", "start": "14:50", "duration": "01:00", "room": "Track 2", "slug": "le-tour-du-hack-2026-9-from-data-to-defense-real-world-cyber-threat-intelligence-threat-hunting", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/QS9WQH/", "title": "From Data to Defense: Real-World Cyber Threat Intelligence & Threat Hunting", "subtitle": "", "track": null, "type": "Long Talk", "language": "en", "abstract": "Cyber attacks don\u2019t start with alerts \u2014 they start long before, hidden in data.\r\n\r\nThis talk explores how Cyber Threat Intelligence (CTI) transforms raw data into actionable insights, enabling defenders to move from reactive to proactive security.\r\n\r\nThrough real-world examples, including large-scale event targeting scenarios, we\u2019ll break down how attackers operate, how defenders detect them, and how you can start threat hunting effectively.", "description": "This session dives into the practical side of Cyber Threat Intelligence (CTI) and Threat Hunting, focusing on how defenders can anticipate, detect, and respond to modern cyber threats.\r\n\r\nWe will begin by understanding what threat intelligence really means beyond buzzwords, covering its lifecycle, types, and how it integrates into real security operations.\r\n\r\nThe session then explores attacker behavior using frameworks like MITRE ATT&CK and the Cyber Kill Chain, helping attendees understand how adversaries think, move, and exploit systems.\r\n\r\nA key part of the talk will focus on threat hunting \u2014 how to proactively search for threats using indicators of compromise (IOCs), behavioral patterns, and attacker TTPs.\r\n\r\nWe will also walk through a real-world inspired case study based on large-scale global events (such as international sporting events).\r\n\r\nBy the end of the session, attendees will:\r\nUnderstand how to apply CTI in real environments\r\nLearn how to identify high-value detection signals (TTPs vs IOCs)\r\nGain a beginner-friendly roadmap to start threat hunting\r\nBe able to think like both an attacker and a defender\r\n\r\nThis talk is designed for students, beginners, and intermediate cybersecurity enthusiasts who want practical, actionable insights not just theory.", "recording_license": "", "do_not_record": true, "persons": [{"code": "YHKLPF", "name": "Ayush Aggarwal", "avatar": null, "biography": "I am a cybersecurity researcher, threat analyst, and bug bounty hunter based in Warwick, UK, currently pursuing an MSc in Cybersecurity. I have also worked as a Research Assistant with WMG, contributing to cybersecurity-focused research.\r\n\r\nI have reported multiple security vulnerabilities across leading global platforms and have been recognized in the Hall of Fame by organizations including BBC, Microsoft, Apple, HubSpot, and the University of San Diego.\r\n\r\nI discovered CVE-2023-37728, an XSS vulnerability in IceWarp Server impacting over 100,000 users globally. I I was recognized by Apple, Microsoft, and Red Bull as an Elite, world-class bug hunter.\r\n\r\nI am passionate about securing digital ecosystems and continuously work on identifying and responsibly disclosing security vulnerabilities.", "public_name": "Ayush Aggarwal", "guid": "1e2524f2-f61b-508e-b595-6915e88745d6", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/YHKLPF/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/QS9WQH/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/QS9WQH/", "attachments": []}, {"guid": "9a99e207-5c47-5174-ab5e-9d420b4d3019", "code": "T7937A", "id": 10, "logo": null, "date": "2026-05-16T15:50:00+00:00", "start": "15:50", "duration": "00:30", "room": "Track 2", "slug": "le-tour-du-hack-2026-10-burning-the-candle-at-all-ends-a-burnout-talk", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/T7937A/", "title": "Burning the candle at all ends - a burnout talk", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "Life sucks. Between the chaos of work/uni life and personal life, it can be hard to make time for some R&R. We will be discussing what you can do to better manage the chaos as well as activities you can do to unwind and disconnect from the world for a bit.", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"code": "9E8L3V", "name": "Kit", "avatar": null, "biography": "Edinburgh Napier Graduate 2023 with interest in medical device security. Still learning everyday.", "public_name": "Kit", "guid": "0a9781a9-cb6e-55a2-8a4f-a0293eb86491", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/9E8L3V/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/T7937A/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/T7937A/", "attachments": []}, {"guid": "9a2c26a6-63e1-5507-b3f8-d79e19a16567", "code": "QFVNJL", "id": 14, "logo": null, "date": "2026-05-16T16:20:00+00:00", "start": "16:20", "duration": "00:30", "room": "Track 2", "slug": "le-tour-du-hack-2026-14-dumb-shit-in-history-3-0", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/QFVNJL/", "title": "Dumb shit in history 3.0", "subtitle": "", "track": null, "type": "Normal Talk", "language": "en", "abstract": "History is full of people making terrible decisions with absolute confidence. \u201cDumb Shit in History Part 3\u201d dives into absurd real-world events \u2014 including fake armies, corpse trials, poisoned aristocrats, and wars over almost nothing \u2014 before drawing uncomfortable parallels to modern cyber security. Equal parts comedy, history lesson, and cautionary tale.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "Z7C8C8", "name": "Jon", "avatar": null, "biography": "Later", "public_name": "Jon", "guid": "939b4099-7f42-5974-9e22-e20838226e5f", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/Z7C8C8/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/QFVNJL/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/QFVNJL/", "attachments": []}], "Track 3": [{"guid": "aeb71d11-9617-52f3-8543-393b270efc46", "code": "7DSCQG", "id": 28, "logo": null, "date": "2026-05-16T10:00:00+00:00", "start": "10:00", "duration": "01:30", "room": "Track 3", "slug": "le-tour-du-hack-2026-28-lockpicking-physical-security-village", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/7DSCQG/", "title": "Lockpicking & Physical Security Village", "subtitle": "", "track": null, "type": "Long Talk", "language": "en", "abstract": "Come pick locks", "description": "", "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/7DSCQG/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/7DSCQG/", "attachments": []}, {"guid": "9b94141f-16f7-5792-a204-bf3b3b1a842f", "code": "ZR3GKH", "id": 17, "logo": null, "date": "2026-05-16T13:10:00+00:00", "start": "13:10", "duration": "01:00", "room": "Track 3", "slug": "le-tour-du-hack-2026-17-hiding-in-plain-sight-osint-ctf-workshop", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/ZR3GKH/", "title": "Hiding in Plain Sight - OSINT CTF (workshop)", "subtitle": "", "track": null, "type": "Long Talk", "language": "en", "abstract": "Hiding in Plain Sight - OSINT CTF", "description": "Open Source Intelligence (OSINT) CTF", "recording_license": "", "do_not_record": true, "persons": [{"code": "FPYGYR", "name": "Luiz S", "avatar": "https://speak.enusec.org/media/avatars/FPYGYR_vm53QSL.webp", "biography": "Luiz leads the Offensive Security practice at Bridewell and has 2 decades of experience as a penetration tester, red team manager and leader.\r\nHe is a Chartered Cyber Security Professional (ChCSP), holds an MSc in Information Security from Royal Holloway along with various industry certifications.\r\nLuiz has a particular interest in user-driven attacks, and leveraging social engineering to bypass technical controls.", "public_name": "Luiz S", "guid": "bc028890-e4a1-5e81-811b-f44d54502e39", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/FPYGYR/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/ZR3GKH/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/ZR3GKH/", "attachments": []}]}}, {"index": 2, "date": "2026-05-17", "day_start": "2026-05-17T04:00:00+00:00", "day_end": "2026-05-18T03:59:00+00:00", "rooms": {"Track 1": [{"guid": "5e17a5aa-e743-5a97-a79a-9c44f272087d", "code": "RJMCQN", "id": 34, "logo": null, "date": "2026-05-17T09:30:00+00:00", "start": "09:30", "duration": "01:00", "room": "Track 1", "slug": "le-tour-du-hack-2026-34-doors-open-day-2", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/RJMCQN/", "title": "Doors Open - Day 2", "subtitle": "", "track": null, "type": "Long Talk", "language": "en", "abstract": "When we will admit attendees into the space for the CTF on day 2", "description": "", "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/RJMCQN/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/RJMCQN/", "attachments": []}, {"guid": "607e9caf-987a-5c1a-b898-bd94fd5c7559", "code": "KEESQ9", "id": 30, "logo": null, "date": "2026-05-17T10:30:00+00:00", "start": "10:30", "duration": "00:15", "room": "Track 1", "slug": "le-tour-du-hack-2026-30-welcome", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/KEESQ9/", "title": "Welcome", "subtitle": "", "track": null, "type": "Lighting Talk", "language": "en", "abstract": "Welcome and CTF Kickoff", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "CRXUMY", "name": "Team ENUSEC (Connor, Scott, Lewis, Xander & Eden)", "avatar": null, "biography": "This year's ENUSEC committee;\r\n\r\nConnor - President\r\nScott - Vice President\r\nLewis - Secretary\r\nXander - Treasurer\r\nEden - Media Officer", "public_name": "Team ENUSEC (Connor, Scott, Lewis, Xander & Eden)", "guid": "84c53436-2501-5e1d-bc97-0920d467c55d", "url": "https://speak.enusec.org/le-tour-du-hack-2026/speaker/CRXUMY/"}], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/KEESQ9/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/KEESQ9/", "attachments": []}, {"guid": "1e312085-9166-52da-9ea7-15f614d55e0a", "code": "EDFY3Z", "id": 37, "logo": null, "date": "2026-05-17T10:45:00+00:00", "start": "10:45", "duration": "01:15", "room": "Track 1", "slug": "le-tour-du-hack-2026-37-ctf-morning", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/EDFY3Z/", "title": "CTF - Morning", "subtitle": "", "track": null, "type": "Long Talk", "language": "en", "abstract": "CTF competition before lunch", "description": "", "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/EDFY3Z/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/EDFY3Z/", "attachments": []}, {"guid": "21dd83fb-7deb-5eeb-a806-123e48dfe52b", "code": "89DEJE", "id": 35, "logo": null, "date": "2026-05-17T12:00:00+00:00", "start": "12:00", "duration": "01:00", "room": "Track 1", "slug": "le-tour-du-hack-2026-35-lunch-day-2", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/89DEJE/", "title": "Lunch - Day 2", "subtitle": "", "track": null, "type": "Long Talk", "language": "en", "abstract": "Lunch break during the CTF", "description": "", "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/89DEJE/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/89DEJE/", "attachments": []}, {"guid": "33c476e7-7184-5a99-acdb-02ab78b9ec5a", "code": "BCNJVW", "id": 36, "logo": null, "date": "2026-05-17T13:00:00+00:00", "start": "13:00", "duration": "03:30", "room": "Track 1", "slug": "le-tour-du-hack-2026-36-ctf-resumes", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/BCNJVW/", "title": "CTF resumes", "subtitle": "", "track": null, "type": "Long Talk", "language": "en", "abstract": "CTF resumes after lunch", "description": "", "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/BCNJVW/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/BCNJVW/", "attachments": []}, {"guid": "9f9d5a97-1392-51be-b4ed-519f706c869e", "code": "MUEAY9", "id": 38, "logo": null, "date": "2026-05-17T16:30:00+00:00", "start": "16:30", "duration": "00:10", "room": "Track 1", "slug": "le-tour-du-hack-2026-38-ctf-prizes-and-event-ends", "url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/MUEAY9/", "title": "CTF - Prizes and event ends", "subtitle": "", "track": null, "type": "Lighting Talk", "language": "en", "abstract": "CTF ends, we'll hand out the prizes", "description": "", "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/MUEAY9/feedback/", "origin_url": "https://speak.enusec.org/le-tour-du-hack-2026/talk/MUEAY9/", "attachments": []}]}}]}}}