| Introduction and Guest Introduction
| The Unseen Costs of Cybersecurity Regulation
| OTA Updates: Security Savior or Hidden Risk
| CRA vs. Other Regulations: What Matters Most
| The Rise of Runtime Security Monitoring
| Why Manufacturers Are Freaking Out About CRA
| The Hidden Cost of Legacy Firmware
| Inside the Automotive Cybersecurity Playbook
| eBPF: The Next Frontier in IoT Security
| Coffee Machines, Coffee Attacks, and Unexpected Entry Points