-
Welcome Address
- BSides Crew
-
Cyber Systems Of The Powergrid. How Does Power
Get To Your Tea Kettle From The Power Plant
- Bigezy
-
You Won't Even Know It's Recording You!
- Elaheh Samani
-
A Safer Way To Pay - Comparing The Security
And Integrity Of 21st Century Payment Systems
- Chester Wisniewski
-
State Sponsored Stalking ?!
- Paul Rascagnères
-
The Imitation Game: Emulating Attackers
- Wietze Beukema
-
Using Network Miner To
Reconstruct Network Traffic
- Matthew Short
-
Bots: Can They Really Be Managed?
- Diana Alvarado
-
SOC It Up! - Common Frustrations
And Solutions In SOC Teams Today
- Jymit Khondhu
-
Fixing The Internet's Auto-Immune Problem:
Bilateral Safe Harbor For Good-Faith Hackers
- Chloe Messdaghi
-
Password Cracking; The First 500 Million
- Jamie Riden
-
The Little Phone That Could Ch-ch-chroot.
- Mathew Evans and Jack Whitter-Jones
-
Exploring Emotet, An Elaborate Everyday Enigma
- Luca Nagy
-
Turning Your Weapons Against You.
- Andrew Blane
-
Understanding Stress, Anxiety
And Depression And How To Cope
- Olga Zilberberg
-
When The Magic Wears Off: Flaws In ML For
Security Evaluations (And What To Do About It)
- Lorenzo Cavallaro
-
Digital Intelligence Investigations
- James
-
Usernames, The Missing Piece:
The OSINT Jigsaw Puzzle
- Simon Hall
-
Watching The Watchers:
The Stalkerware Surveillance Ecosystem
- Cian Heasley
-
Powershell Is DEAD-Epic Learnings!
- Ben Turner
-
Stalkerware In Mobile Devices
- Jessica Amery
-
AWS Vs Azure Security
- Paul Schwarzenberger
-
Build To Hack, Hack To Build.
- Chris Le Roy
-
My First Program: A Pentesting Tool
- Nina Fasel
-
They Are The Champions: How To Build And Maintain An Effective
Cybersecurity Champion Programme Within Your Organisation
- Kevin Millwood And Jessica Barker
-
We Take Your Security Seriously. Or Do We?
- The Beer Farmers
-
ISIS Online: Junaid Hussain
- Michael Jack
-
Bug Bounties: Crowdsourcing Nosey Bastards
- Jamie O'Hare
-
Mission Assurance In
Closed, Proprietary Systems
- Josh De Boer
-
Aletheia: GPU Accelerated File Carving
- Corey Forbes
-
Closed For Business:
Taking Down Darknet Markets
- John Shier
-
Hacking RF: Breaking What We Can't See
- Grant Colgan
-
The Keymaker
- Maksims Luferovs
-
Forensicating Windows Artifacts:
Investigation Without Event Logs!
- Renzon Cruz
-
The Definition Of Madness
- Ian Davies
-
Inside Magecart:
Their Web Skimming Tactics Revealed
- Terry Bishop
-
Offensive Pcap
- Stuart McMurray
-
Frida The "Hooker"
- Barnabas Sztan-Kovacs
-
Vendor Data Science Buzzwords Hacked
- Thordis Thorsteins
-
CyberRange:
An Open-source Offensive Security Lab In AWS
- Thomas Cappetta
-
Spear Phishing: From Linkedin To Loggedin
- Alex Archondakis
-
A Newbie's Talk On Mobile Dangers
Through The Looking Glass
- Sarah Kingham
-
Automation In Application Security
- Javier Dominguez
-
Closing Remarks
- BSides Crew