-
Welcome
- BSides London
-
MITRE ATLAS:
Exploring AI Vulnerabilities
- Arthur Frost
-
An Introduction To
Patient Medication Records
- Darren
-
BYOTB: Bring Your Own Trusted Binary
- David Kennedy
-
Unmasking APT Malware Activity: Real-World Malware Campaign
Tracking Using Big Data Analytics And Machine Learning Clustering
- Daniel Johnston
-
Using The OWASP Top 10 To
Save The Astronauts From HAL
- Nick Dunn
-
Adopt Or Risk: Why Zero Trust
Is Key To Modern Cyber Defence
- Meletius Igbokwe
-
Can You SEE!!
A Risk Approach To SIEM
- Richard Kirk
-
Commanding Heights: Unmasking
COM-Based UAC Bypass Techniques
- Amankumar Badhel
-
Is AI The New Big Brother?
- Tom
-
The Practical Application Of Indirect Prompt
Injection Attacks: From Academia To Industry
- David Willis-Owen
-
To You Its A Black Swan,
To Me Its A Tuesday
- David V.
-
Healthcare’s Anatomy: Dissection Of Dicom,
A Protocol To Nmap Your Body!
- 0xSeeker
-
From Zero To Cyber Hero: A Non-Techie's
Guide To Breaking Into Cybersecurity
- Egonna Anaesiuba-Bristol
-
LLM Security:
Attacks And Controls
- Nazeef Khan
-
Robert Redford Made Me Do It:
Physical Security Stories And Tips
- Matthew Steed
-
From Molecules To Malware: Visualising TLS
Fingerprints With TMAP To Hunt Malicious Domains
- Amanda Thomson
-
CyberHUMINT: Recruit, Deceive, Exploit
- Tony Gee & Hugo Page-Turner
-
Software Security Issues
For Small IoT SoCs
- Stephen Cravey
-
Explaining ICS To A Fool Of A Took
- halfling
-
It's Been A Good Run:
Why I Stopped Doing OSINT CTFs
- Alan O'Reilly
-
A Minimal Talk On
Distroless Containers
- Will Dollman
-
Password Hell: Accessibility
Challenges In Cyber Security
- Ana Maia
-
Quantum Safe Cryptography:
A Buzzword Or Something More Serious?
- Suketu
-
Elevate Your SSRF Game: Weaponize Internal
DNS Records To Expose Hidden Endpoints
- Guy Arazi
-
What’s Inside The Open Directory
From 96 Different Threat Actors?
- Alana Witten
-
CV Workshop
- Samira Ali
-
Continuous Threat Modelling Using Large Language Models
- Gurunatha Reddy G & Pranay Sahith Bejgum
-
Disabling Drones: Disruption
And Forensic Data Analysis
- Paavai Aram
-
Storytelling For SOC Analysts: Effective Investigation
Notetaking And Report Writing (Without ChatGPT!)
- Han O’Connor
-
Gamihackation:
Learning The Gaming Attack Surface
- Alex Villegas
-
The Psychology Of Cyber:
Navigating A Crisis Like A Pilot
- George Chapman
-
Do Loop Back In Anger
- Shane Bourne
-
Inside The Ransomware Toolbox: How To
Beat Cybercriminals At Their Own Game
- Will Thomas
-
Is Your Approach To Pipeline Security
Flawed? Rethinking CI/CD Security
- Patricia R
-
Post-Quantum Cryptography For 2025
- Andy Smith
-
BrakRPi: Crashing Bluetooth Communications
On Raspberry Pi With Braktooth
- Ilias
-
What Happens After A
Business Email Compromise (BEC)
- Umair Qamar
-
Unmasking The Deepfake Threat: Detection,
Prevention, And Navigating The Future
- Onyedikachi Ugwu
-
The Trustworthiness Of Generative AI In
Real-Time Decision-Making For IoT Devices
- Meet Bhorania and Yash Akbari
-
From Garden To Grid: Lessons From Gardening
For A Resilient Cybersecurity Strategy
- Becky Hall
-
Roll Your Own Vulnerabilities; An Introduction To Fault-
Injection For Exploiting Bug-Free Code In Embedded Systems
- @barsteward
-
When The Hunter Becomes The Hunted:
Using Minifilters To Disable EDRs
- Tom Philippe
-
Threat Analysis In Minutes
And Other AI Super Powers
- Bailey Williams
-
Memoryless Peripherals
And Secure Notebooks
- Kai
-
VEXatious Vulnerabilities: CVE Management
For The Overwhelmed Security Engineer
- Feroz Salam
-
Turning To The Dark Side: Utilizing
Offensive Techniques In Incident Response
- Archie Essien
-
Inside The Phish Tank: A Guide To
Compromising Phishing Infrastructure
- Vangelis Stykas & Felipe Solferini
-
Cybersecurity’s New Imperative: Defending Enterprise
And National Cognitive Infrastructures
(By Strengthening The Mental Immune System)
- Winn Schwartau
-
Let’s Phish: How To Scam
Everyone, Everywhere, All At Once
- Dita Pesek
-
Securing Embedded Devices In Robotics And IoT:
Bridging The Gap Between Innovation And Security
- Victor Oriakhi Nosakhare
-
MSSP, MDR, MFA - So Why Isn't
Incident Response Solved?
- Tim Haynes
-
OWASP Honeypot
Threat Intelligence Project
- Kartik Adak
-
Building The ATT&CK Pipeline For Linux
- Tim Wadhwa-Brown
-
The Past, Present And Future
Of Cloud-Native Security
- Emma Yuan Fang
-
How To Attack A SIEM
- Daniel Crossley
-
Closing Bits, Raffle And Prize Awards
- BSides London