• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Twitter
  • 2023
  • 2022
  • 2019
Edition logo

BSides Cheltenham 2022

2022-07-09
  • Thumbnail for the video - click to play

    ►

    Welcome And Announcements
    - BSides Cheltenham Orga
  • Thumbnail for the video - click to play

    ►

    War Stories Of A Social Engineer
    - Chris Pritchard
  • Thumbnail for the video - click to play

    ►

    AI And Deception In Cyber Security
    - Boris Taratine
  • Thumbnail for the video - click to play

    ►

    Securing The Supply Chain: Practicality vs. Paranoia
    - Alan Mills
  • Video will not be published
    Digital Bank Robbers: Exploiting Decentralized Finance Protocols
    - Josh Hulse
  • Thumbnail for the video - click to play

    ►

    Log4Shell If You Don't Know Any Java
    - Philipp Krenn
  • Thumbnail for the video - click to play

    ►

    Crowdsourced Information Sharing In IoT Cybersecurity
    - Kieran Hooper-Warren,Tyrone Stewart and Seamus McGurgan
  • Thumbnail for the video - click to play

    ►

    SMBeagle: SMB Share Hunter
    - Daniel Oates-Lee
  • Thumbnail for the video - click to play

    ►

    DPFuzzer: A Platform Independent DisplayPort Fuzzer
    - Simon Vincent And Ross Cuthbertson
  • Thumbnail for the video - click to play

    ►

    Maslow's SOC
    - Luigi Ritacca
  • Thumbnail for the video - click to play

    ►

    Capture The Fun - Gamified Learning
    - Andras Borbely
  • Thumbnail for the video - click to play

    ►

    Long Range WiFi Magic
    - Alex Farrant
  • Thumbnail for the video - click to play

    ►

    The Evolution Of A Cyber Security Product
    - Lauren Astell
  • Thumbnail for the video - click to play

    ►

    Binary Exploitation: Android Edition
    - John D
  • Thumbnail for the video - click to play

    ►

    Building The Right Business Culture To Manage Human Error
    - Ryan Pullen
  • Thumbnail for the video - click to play

    ►

    Cross-Site Scripting, Modern Protection And Payloads
    - Dan Cannon
  • Thumbnail for the video - click to play

    ►

    Emerging Threats Against Cloud Application Identities And What You Should Do About Them
    - Yochana Henderson
  • Thumbnail for the video - click to play

    ►

    Game Theory & Its Applications Across Cyber Security
    - Ryan Rutan
  • Thumbnail for the video - click to play

    ►

    How To Rise To The Ransomware Challenge: NCSC For Startups Panel
    - Panel
  • Video will not be published
    Closing Remarks
    - BSides Cheltenham Orga