-
Welcome And Announcements
- BSides Cheltenham Orga
-
War Stories Of A Social Engineer
- Chris Pritchard
-
AI And Deception In Cyber Security
- Boris Taratine
-
Securing The Supply Chain:
Practicality vs. Paranoia
- Alan Mills
-
Digital Bank Robbers:
Exploiting Decentralized Finance Protocols
- Josh Hulse
-
Log4Shell If You Don't Know Any Java
- Philipp Krenn
-
Crowdsourced Information
Sharing In IoT Cybersecurity
- Kieran Hooper-Warren,Tyrone Stewart and Seamus McGurgan
-
SMBeagle: SMB Share Hunter
- Daniel Oates-Lee
-
DPFuzzer:
A Platform Independent DisplayPort Fuzzer
- Simon Vincent And Ross Cuthbertson
-
Maslow's SOC
- Luigi Ritacca
-
Capture The Fun - Gamified Learning
- Andras Borbely
-
Long Range WiFi Magic
- Alex Farrant
-
The Evolution Of A
Cyber Security Product
- Lauren Astell
-
Binary Exploitation: Android Edition
- John D
-
Building The Right Business
Culture To Manage Human Error
- Ryan Pullen
-
Cross-Site Scripting, Modern
Protection And Payloads
- Dan Cannon
-
Emerging Threats Against Cloud Application
Identities And What You Should Do About Them
- Yochana Henderson
-
Game Theory & Its Applications
Across Cyber Security
- Ryan Rutan
-
How To Rise To The Ransomware Challenge:
NCSC For Startups Panel
- Panel
-
Closing Remarks
- BSides Cheltenham Orga