• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
Edition logo

BSides Exeter 2025

2025-04-26
  • Video not yet published
    Accelerating Progress: Shifting From A Reactive To A Proactive Approach In Cybersecurity
    - Heather Lowrie
  • Video not yet published
    Aftermath: The Human Cost Of Ransomware
    - Adrian Taylor
  • Video not yet published
    Why Should Professionalism Matter To You?
    - Debi McCormack
  • Video not yet published
    Is Your Phone Spying On You? An In-Depth Analysis Of Vulnerabilities In Cisco VoIP Phones
    - Balazs Bucsay
  • Video not yet published
    Prompt-ing The Injection: LLMs Under Attack!
    - Smitha Bhabal
  • Video not yet published
    HODL Your Keys: How Seed Phrases Get Stolen
    - Mykhailo Shtepa
  • Video not yet published
    Zero To Pentester: My ‘root’ Into Cyber
    - Ross Mitchell
  • Video not yet published
    Security Mismatch. Organisational Users Have Different IT Expectations From System Administrators. Using Organisational Culture To Close The Gap
    - Richard Henson
  • Video not yet published
    One Flew Over The Auditors Nest Dodging The Pitfalls Of Compliance
    - Chris
  • Video not yet published
    Analyzing The Impact Of Spectre And Meltdown Vulnerabilities On Modern Computing Systems: A Case Study
    - Mohammed Mohtesham Ali and Abhishek Aggarwal
  • Video not yet published
    The Art Of Threat Modelling
    - Paul Spruce
  • Video not yet published
    Black Belt Security: Lessons From Karate
    - Rudi Van Der Heide
  • Video not yet published
    Custom Scripts And Tools For Pen Testing: a Beginner's Guide
    - Adam Crease
  • Video not yet published
    Boost Your Organisation’s Cyber Maturity With Offensive Security
    - Eliza-May Austin
  • Video not yet published
    Ctrl Panic + Alt Response Plans + Del The Drama: Best Practices For Incident Response
    - SWRCCU Protect Officers
  • Video not yet published
    Cybersecurity Threats And Attacks In Modern Manufacturing
    - Achim D. Brucker
  • Video not yet published
    Battle-Tested Incident Recovery: Lessons From The Front Lines
    - Jack Hughes
  • Video not yet published
    The Uncomfortable War: Keeping Kids Safe.
    - Joe Wells
  • Video not yet published
    The Single-Packet Shovel: Digging For Desync-Powered Request Tunnelling
    - Thomas Stacey
  • Video not yet published
    Hacktivists V2.0
    - Lisa Forte
  • Video not yet published
    Grand Social Engineering: DevSecOps And Influence
    - Seb Coles
  • Video not yet published
    Super Pets: The Hero You Didn't Know You Had In Your House!
    - Gary Cox
  • Video not yet published
    Beacon Harvest: Conquering Cobalt Strike At Scale
    - Ben (@polygonben)
  • Video not yet published
    Hacking The Job Market: Double Your Chances Of Landing An Ethical Hacker Role
    - Mikael Svall
  • Video not yet published
    Buffy Vs. Phishing: Slaying Cyber Threats Sunnydale Style
    - Andreea Mihai
  • Video not yet published
    Paint Me Like One Of Your Firmwares
    - Callum T
  • Video not yet published
    The (Un)Natural History Of Malware
    - Lena Yu
  • Video not yet published
    Closing Talk
    - TBA