-
Opening Remarks
- BSides Leeds Orga
-
Keynote
- Jayson E Street
-
Bad Vibes, Good Job Security? The Future
Of Security In An AI Saturated World
- Katie Paxton-Fear
-
Beneath The Surface:
Mobile Apps Security Challenges
- Qais Temelza
-
Dark Web For Dummies
- Jennifer Holland
-
Femtech And Data Privacy:
What’s At Stake?
- Arohi Naik
-
Side-Channel Attacks Via CPU Caches:
Methods And Mitigations
- Pratik Shrestha
-
Rage Against The Machine(s):
An Intro To Operational Technology (OT) Hacking
- Liam McGrath
-
Look Twice Before You Run: Why You Must Make Your Company's
DEV Team Formally Verify Their Shiny New Feature Before Deployment
- Rahul Balaji
-
Confound And Delay: Honeypot Chronicles
From The Digital Battlefield
- Kat Fitzgerald
-
Plundering And Pillaging Password
And Passphrase Plains For Profit
- Will Hunt
-
Getting Started With Vulnerability Management:
Lab Lessons Using STIGs, NIST & Real-World Scans
- Japheth Effar
-
Do Scanners Suck?
I Have The Receipts
- Thomas Ballin
-
The Sound Of Secrets
- James Bore
-
Beyond Research: Deploying Operational Honeypots
For High-Fidelity Threat Detection And Intelligence
- Anicet Fopa Tchoffo
-
Striding Out To
Prevent Misconfigurations
- Andrea Jones
-
Hack The Planet!
What Movies Can Teach Us About InfoSec
- Simon Painter
-
Building An XSS Playground
- Paul Johnston
-
Password Hell: Accessibility
Challenges In Cyber Security
- Ana Maia
-
BrakRPi: Crashing Bluetooth Communications
On Raspberry Pi Using Braktooth
- Ilias Akhmedov
-
The World Of Cyber Security,
According To Microsoft (101 Level)
- Nick Lines
-
Escaping Big Brother (Or Your Ex):
Counter Surveillance For Women's Shelters
- Erlern
-
Building Your Microsoft Sentinel Attack Range:
Simulating MITRE ATT&CK Techniques In Azure
- Albert Timileyin
-
AI Is Taking My Job... But Is It?
- Lauren Spokes
-
Stop Making Nonsense:
Cutting Through Compliance Complexity
- Mat Caplan
-
Container Confidential:
Secrets Management For Modern Applications
- Adam Matthews