- CRESTxLancaster - Abdulrahman Alajaji - The new cyber security strategy of the EU
- CRESTxLancaster - Andy Williams - Compliance A new route to security risk
- CRESTxLancaster - Ben Green - Monitoring, control, and automation
- CRESTxLancaster - Claire Hargreaves - Understanding cyber criminals and measuring their future activ
- CRESTxLancaster - David Ellis - Disrupting online groups
- CRESTxLancaster - Dr Alistair Baron - Dealing with Fake Digital Personas
- CRESTxLancaster - Dr Andreas Mauthe - PReSET A toolset for the evaluation of network resilience str
- CRESTxLancaster - Dr James Brown - Home Jamming
- CRESTxLancaster - Dr Jose Such - Challenges for next generation SNS privacy controls
- CRESTxLancaster - Dr Kevin Jones - Protecting the Critical National Infrastructure from Cyber Attack
- CRESTxLancaster - Hugh Boyes - Bridging the cyber security skills gap
- CRESTxLancaster - Ian Glover - Making security a profession
- CRESTxLancaster - Lara Warmelink - Detecting deception in intentions
- CRESTxLancaster - Mark Pegram - Information Governance in the Cloud
- CRESTxLancaster - Michael Watson - Detecting malware in the cloud
- CRESTxLancaster - Noor Shirazi - Challenge detection in cloud computing
- CRESTxLancaster - Oliver Fitton - The Syrian Electronic Army
- CRESTxLancaster - Radovan Bruncak - Detecting botnet communication activities in real time
- CRESTxLancaster - Steven Warner Jones - Security at Lancaster
- CRESTxLancaster - Tony Wilson - Using Google as a security tool