-
Introductions & Housekeeping
- BSides Brum Organizers
-
Understanding and Mitigating Adversarial AI
in Cyber security Tools
- Bisola
-
Strength in Unity: The Power of Collaboration
in Cybersecurity & Personal Growth
- Katie Wood
-
Prompt-ing the Injection - LLMs Under Attack!
- Smitha Bhabal
-
Disinformation as a Cyber Security Threat:
Strategic Implications in the Age of AI
- Dr Haider Al-Khateeb
-
Thriving in an 'Always On' World:
Managing Stress & Building Resilience
- Candice Pearce
-
Online Gaming Scams: A Guide to Prevention
- Kachi
-
Cracking the Code: Attacking and Defending Active
Directory Certificate Services
- Kartik Adak
-
Mob4Mobs: An Introduction to Mobile Security
- Joe D'Souza
-
To you, it's a Black Swan, to me, it's a Tuesday
- David
-
Using Machine Learning to Enhance Cyber Threat Detection
- Gbubemi Erics
-
Unmasking the Deepfake Threat:
Detection, Prevention, and Navigating the Future
- Kachi
-
It's going to be better for you!
- Ian Thornton-Trump aka. Phat Hobbit
-
Hack Your Future: Cracking the code to seizing
opportunities for a future in Cybersecurity
- Diya and Phoebe
-
AI-Powered Digital Warfare:
Cyber Violence in the Age of Algorithms
- Dr. Anitha Chinnaswamy
-
The Rise of LLMs: Unveiling Cyber Threats and
Staying Ahead of the Curve
- Dr. Manimuthu Arunmozhi
-
From model to cyber security (and everything in between!)
- Lisa Diaz
-
Operationally Struggling Corporate Pentesters
- Nigel Ng
-
Advanced SOC Strategies:
Detection as Code and Threat Layering
- Dan Quilter
-
Agile Threat Modeling:
Integrating Security into Rapid Development
- Kay Adelaja
-
Siri, Are You Spying on Me?
- David Lodge
-
Is Your Phone Spying on You?
An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones
- Balazs Bucsay
-
Beacon Harvest: Conquering Cobalt Strike at Scale
- Ben Holland
-
The (Un)Natural Sciences of Malware Analysis
- Lena Yu
-
Closing Remarks
- BSides Brum Organizers