-
Welcome And Announcements
- BSides Cheltenham Orga
-
A Potted History Of British SIGINT
- David Abrutat
-
From Sales To Social Engineering
- James Mason
-
Using Machine Learning
To Detect Phishing Emails
- Anthony Saich
-
Bypassing Anti-Virus Using BadUSB
- Cristian Cornea
-
They Can't Keep Getting Away With It: A Threat
A Threat Analysis Of 0ktapus SMS Phishing Campaigns
- Will Thomas
-
AI And Pentesting
- Dan Canon
-
All Your Firmwares Are Belong To Us:
A Guide To Successful Acquisition
- Stephen
-
Identifying Rogue Android Devices:
The World Of Android Attestation
- James Stevenson
-
Turning The Tables: Using Cyber
Deception To Hunt Phishers At Scale
- Ross Bevington
-
Making Your Own Cool Conference Badges!
- Simon Gurney
-
Reserving The Right To Be Wrong
- James Bore
-
Git Those Passwords Out Of Your Repos!
- Dan Oates-Lee
-
Weaponizing Mobile Infrastructure: Are Politically
Motivated Cyberattacks A Threat To Democracy?
- Imran Saleem
-
Encrypted Client Hello: What Does This Mean For
Attackers And Defenders Looking At TLS Connections?
- Paul Brears
-
Reimagining The Intelligence Deliverables
Using Structured Threat Content
- Gert-Jan Bruggink
-
Android Binder Message Tracing Tool
- Sam Phelps
-
Tracking Hackers From Cheltenham: Microsoft's Threat
Intelligence Work To Identify And Illuminate Nation State Threats
- Thomas Griffith
-
Attacking And Defending On-Premises
And Cloud-Based Kubernetes Services
- Sadi Zane
-
Wargames 2023
- Andrew Peck
-
Closing Remarks
- BSides Cheltenham Orga