-
Opening Speech
- BSides Org Team
-
Keynote Speech
- John Shier
-
Robots For Complete Beginners
- Mark Goodwin
-
Let That Think In: Thought Experiments
And Their Application To Cyber Security
- Matt Wixey
-
Fangxiao, A Chinese Phishing Threat Actor
- Emily Dennison & Alana Witten
-
Verify, Then Trust
- Rick Jennings
-
Electryone: In The Land With No Sun
- Vangelis Stykas
-
Extending The Capabilities Of Dependency Modelling For Risk Identification In An ICS Environment
- Ayo Rotibi
-
Developing Cybersecurity Curriculum For Secondary School
- Maha Alotaibi
-
Trust & Blame In Self-Driving Cars Following A Cyber Attack
- Victoria Marcinkiewicz
-
Bohemian IcedID - Queen Of Loaders
- Josh Hopkins & Thibault Seret
-
A Review Of Intrusion Detection Systems In Large-scale IoT Systems: Challenges, Approaches, And Needs
- Othmane Belarbi
-
Why Critical Thinking Is Not The Answer To Misinformation
- Rob Peace
-
Vulnerability Management Sucks.
- Luke Jones
-
IOC What You Mean
- Darren Kingsnorth
-
Hacking To Defend: How We Hacked Into A Polar Orbit
Satellite And Managed To Get A Full System Compromise
- James (0xJay) & Josh Allman
-
When Diplomats Send Beacon - A Retrospective View Of APT29 Malicious Phishing Campaigns
- Mathias Frank
-
Bypassing Anti-Virus Using BadUSB
- Cristian Cornea
-
Getting In: Initial Access In 2023
- Tony Gee
-
Needles Without The Thread: Threadless Process Injection
- Ceri Coburn
-
EVSE Ecosystems & Connected Vehicle Privacy
- Stuart Criddle & Huw Davies
-
Closing Speech
- BSides Cymru Orga