• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2019
Edition logo

BSides Bristol 2019

2019-06-20 - 2019-06-21
  • Thumbnail for the video - click to play

    ►

    We're Doing It All Wrong: Why We Need To Change Our Approach To Cyber Security
    - Chris Ulliott
  • Video will not be published
    Emerging Threats, Hackers And Attackers: Stories From The SOC
    - Dan Pitman
  • Thumbnail for the video - click to play

    ►

    Data Appropriation Through Organisation Infiltration Using Enhanced Integration And Truth Manipulation
    - Tom Farrant and Sash Rigby
  • Video will not be published
    Exposing Internet Protocol Theft
    - Gaith Taha
  • Thumbnail for the video - click to play

    ►

    People: The Strongest Link
    - Emma W
  • Video will not be published
    Profiling The Attacker: Using Natural Language Processing To Predict Crime
    - James Stevenson
  • Thumbnail for the video - click to play

    ►

    Cloud Security 1984
    - Andi Hudson
  • Video will not be published
    Bad Web Applications: Security Architecture And Pen Testing Horrors
    - Martin Pill
  • Video will not be published
    Irresponsible Disclosure
    - Dylan Wheeler
  • Thumbnail for the video - click to play

    ►

    Security Enablement
    - Sean Wright
  • Video will not be published
    iOS Apps Hacking Just Got Easier
    - Tomer Hadad
  • Video will not be published
    Heimdal Kerberos Authentication And Kerberos Attack Surface
    - Sadi Zane
  • Thumbnail for the video - click to play

    ►

    Common Mistakes And Getting The Basics Right
    - Nic Miller
  • Video will not be published
    Protecting £637 Billion Every Day: How The BofE Has Evolved From A Reactive To A Proactive SOC
    - Jonathan Pagett
  • Thumbnail for the video - click to play

    ►

    IoT From An Attacker's Perspective
    - Venkata Hareesh Peddiraju
  • Thumbnail for the video - click to play

    ►

    Threat Hunting: The Difference Between Safe And Sorry
    - Dan Pitman
  • Thumbnail for the video - click to play

    ►

    Statistical Security For IoT
    - Abia Amin
  • Thumbnail for the video - click to play

    ►

    Ghidra Vs The Cold War
    - Chris A
  • Thumbnail for the video - click to play

    ►

    MITRE ATT&CK Framework For Threat Hunting
    - Seth Brunt and Abby Warnes
  • Thumbnail for the video - click to play

    ►

    Rise Of The Blue Team CTFs
    - Russ Taylor
  • Thumbnail for the video - click to play

    ►

    Spotting The Adversary Using The ATT&CK Matrix: A Practical Approach
    - Pete O
  • Thumbnail for the video - click to play

    ►

    From Bedroom To Boardroom: How To Turn The Idea You Had At 1 AM Into A Multi-Million Turnover Business
    - Nicola Whiting
  • Thumbnail for the video - click to play

    ►

    Logging Made Easy
    - Shane M
  • Thumbnail for the video - click to play

    ►

    Reverse Engineering For Threat Intelligence
    - Vishal Thakur
  • Thumbnail for the video - click to play

    ►

    Pi$$ing Off An APT
    - Ed Williams
  • Thumbnail for the video - click to play

    ►

    Making It Rain: Cryptojacking Attacks In The Cloud
    - Chris Doman
  • Thumbnail for the video - click to play

    ►

    Voodoo People
    - David Hartley