-
Exploring How AI Can Help With Reverse
Engineering Of Application Binaries
- Nathan (@0xdecafe)
-
Domain Name Stupidity
- Liam Follin
-
AI Vs. Hackers:
Unmasking The Cyber Battle Of The Future
- Timon Johnson
-
Harnessing The Power Of Collaboration:
Building A Stronger Cybersecurity
Community For A Safer Digital Future
- Nikki Webb
-
Bsides Cambridge:
Choose Your Own Talk
- Dave Mckenzie
-
Dinosaur Codes And AI Bones:
A Light-hearted Expedition Into Cyber-Paleontology
For Next-gen Cybersecurity Innovation
- Alsa Tibbit
-
The Osint Kill Chain
- Sam Macdonald
-
Elvis May Not Have Left The Building:
AI And The Future Of Trust Relationships,
Where Do We Go From Here?
- Janette Bonar Law
-
The Door's Open
- James Bore
-
AI In The Shell:
Automating Network Scanning & Reporting With Llms
- Matt Adams
-
Dude Check Your Privilege!: Privileged Account
Management Solutions And How They Could Either
Become Your Bestie Or Totally Ruin Your Day
- Melina Phillips
-
Detecting Network Beaconing With
Convolutional Networks And Zeek Logs
- Ignacio Arnaldo (nacho)
-
Mind The Goop
- Dawn O'Connor
-
Pwning For Plaintext:
A Hashcat 2.0 Adventure
- Will Hunt
-
Q&A - The Pitfalls And Possibilities
With Ai In Cyber Security
- Craig Nicholson
-
An Introduction To Assembly
And Reverse Engineering
- Tom Blue
-
Why Cyber Sucks
- Keith Price
-
IKnowU:
Sniffing Airtag Protocol In Town
- Diego Porras
-
Chaos Created By Dll Behaviour:
Under The Lens Of A SOC Analyst
- Amila Perera
-
The Anatomy Of A Threat Hunt:
From Article To Incident
- Lori Taliesin
-
You Don't Need A Calendar
To Tell You When To Test
- Thomas Ballin
-
Arbitrary Code & File Execution In R/o Fs:
In R/O FS – Am I Write?
- Golan Myers
-
The Ballad Of Alex Pedersen:
A Journey Of Compliance As A Techie
- Alex Pedersen
-
Why You Should Stay
- Andy Barratt
-
Slipping The Net:
Qakbot, Emotet And Defense Evasion
- Cian Heasley
-
Methods Of Lateral Movement
Using Windows Openssh
- Matt Lucas
-
Education Vs Experience, Why Not Both?
For A Speech On Degree Apprenticeships
- Charlie Deller
-
Demonstrating Novel Methods Of Finding And
Exploiting Exposed Cloud Assets At Scale
- Shahnoor Kiani (sn0arlax)
-
State-backed Destructive And
Disruptive Cyber Operations
- Molly Elliott
-
Avoiding The Pitfalls:
How Not To Be A Red Teamer
- Hani Momeninia
-
Closing Remarks
- BSides Cambridge Team