-
Opening Remarks
- BSides Bristol Orga
-
The Biggest Cons, And Why They Work
- Sarah Armstrong-Smith
-
So You Wanna Be A Baiter.
- Wayne May
-
Navigating The SBOM Landscape:
Formats, Relevance, And Tooling In 2024
- Viktor Petersson
-
On-line Of Duty: How Police Are
Cracking Down On Global Cyber Crime
- SWRCCU Protect Officers
-
Unveiling The Hunter-Gatherers: Exploring Threat
Hunting Practices And Challenges In Cyber Defense
- Priyanka Badva
-
Automating Detection
And Response With Tines
- Cameron Higgs & Pat Meehan
-
Cybersecurity Lessons From Jurassic Park
- Rohit Satpathy
-
XAI: Unmasking Cyber Threats
Without Crying Wolf
- Alsa Tibbit
-
The Perks Of NOT Being A Wallflower:
Networking For Shy Folk
- James Riley
-
The Squid That Lost Its Shell
- Simon Goldsmith & Christine Sharder
-
Once Upon A Flaw: 5 AppSec Stories,
And What We Can Learn From Them
- Paul Molin
-
The Human Factor:
Quantifying Human Risk
- Sara Anstey
-
Security Automation:
Look At Your Vulnerabilities In The Eyes
- Marine Du Mesnil
-
Metrics That Matter: How To Choose
Cloud Security KPIs For Your Business
- Emma Yuan Fang
-
Building The Future Of Cyber
With Neurodiversity In Mind
- Lucy Smith & Emily Chittell
-
How To Make Cyber Security
Everyone's Business
- Andreea Mihai
-
Decrypting Ransomware: Understanding,
Preventing, And Responding To Cyber Extortion
- Victor Onyenagubom
-
Data, Agents and OSINT:
You Don't Know What You Don't Know
- Ryan Reeves & Zara Perumal
-
The Numbers Game: Lies, Damn Lies, And Statistics
- James Bore
-
Closing Remarks & Charity Raffle
- BSides Bristol Orga
-
Opening Remarks
- BSides Bristol Orga
-
Hacking Planes. What Can We Learn On The
Ground From Vulnerabilities In The Air?
- Ken Munro
-
Ctrl+Alt+Defeat: Using Threat Intelligence
To Navigate The Cyber Battlefield
- Sophia McCall
-
Brexit To BSides:
My Personal Journey Into Security
- Jess Matthews
-
Using LLMs To Accelerate Threat Detection
- Richard Finlay Tweed
-
Decoding Neurodiversity
- Illyana Mullins
-
Managing Cyber Security Risk
In Health Tech
- Iryna Okhrymenko
-
The QR Code Conundrum: Navigating Convenience
And Cyber Security In The Post-COVID Era
- Jack Wise
-
The Se7en Deadly Sins Of OT Security
- Awais Rashid & Joe Gardiner
-
Operationally Struggling Corporate Pentesters (OSCP):
Building Good Processes As A Junior Tester
- Nigel Ng
-
The Prevenance Of PlugX
And Hardening Against It
- Will Bailey
-
9001 Ways To Break Out Of A Container
- Josephine Pfeiffer
-
CTI; It's All About The Process...
Or Probably Should Be!
- Paul Miller
-
IPv6? I Thought We Only Used IPv4?
- David Kennedy
-
@CrackingtheCode
- Vihangi Vagal
-
Passwordless Authentication Using A Combination
Of Steganography, Cryptography And Biometrics
- Tunde Oduguwa
-
Cyber: It Doesn't Need To Be Technical
- SWRCCU Protect Officers
-
Investigating Cyber Threats
To Space Infrastructure
- Jessie Hamill-Stewart
-
Is Your Voice Private?
Security Concerns With Voice Assistants
- Zafrin Malek Mithila
-
Gone Phishing: Why Do We Take The Bait?
- Rhiannon Fairweather & Raffi Rizzo
-
Behind The Scenes Of BSides
- Hazel McPherson & Colette King
-
OfCORS! How To Do Cross Origin
Resource Sharing (Im)Properly
- Cory Turner
-
Want To Speak At BSides?
How To Write Your CfP
- Illyana Mullins
-
Closing Remarks & Charity Raffle
- BSides Bristol Orga