-
Welcome From The Directors
- BSides Exeter Orga
-
Keynote
- Matt Broomhall & Richard DeVere
-
Navigating The Ransomware Negotiation Dilemma:
Unveiling The Pros And Cons Of Negotiation Strategies
- Richard Foster
-
DFIR - Are We There Yet?
- James Phillips
-
Empowering Junior Testers:
Strategies For Uncovering Critical
Vulnerabilities In Web Applications
- Tom Stacey
-
Tales Of DOMinica
- Liam Follin
-
Lessons From The ISOON Leaks
- Will Thomas & Morgan Brazier
-
Cybercrime Central: Vextrio Operates
Massive Criminal Affiliate Program
- Gary Cox
-
Cedar, An Open Source Project To Help
You Decouple Your Authorisation Logic
- Ricardo Sueiras
-
Ctrl+Alt+Defeat: Using Threat Intelligence
To Navigate The Cyber Battlefield
- Sophia McCall
-
Cloaked In Pixels:
Concealing Payloads With Steganography
- Ben Folland
-
Turning The Tables: Using Cyber
Deception To Hunt Phishers At Scale
- Ross Bevington
-
Digital Hostage:
Navigating Ransomware Realities
- Luke Weatherburn-Bird
-
OfCORS! How To Do Cross Origin
Resource Sharing (im)properly.
- Cory Turner
-
Flushing Away Preconceptions Of Risk
- Thom Langford
-
Is Beige The Colour Of Death?
- Ian Thornton-Trump
-
Suppliers: Trust, But Verify
- Todd Gifford
-
On-Line Of Duty: How Police Are
Cracking Down On Global Cyber Crime
- RCCU Sam P And Stephen H
-
Exercise Army Cyber Spartan
- Ben Helliwell
-
Honeypot Boo Boo: Better Breach
Detection With Deception Inception
- Justin Varner
-
Attacking AI: A Primer
- Achim Brucker
-
Panel: Mythbusting The Silver Bullet
- Geoff Revill,Matt Broomhall and Kane Narraway & Gary Cox
-
Tracking TTP Changes Of SocGhoulish
- Chris Morgan
-
Spotted In The Wild
- Anthony Flemmer
-
Closing Talk, Prizes & Thanks From The Director
- BSides Exeter Orga