• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • 2019
Edition logo

BSides London 2019

2019-06-05
  • Thumbnail for the video - click to play

    ►

    Welcome Address
    - BSides Crew
  • Video will not be published
    Cyber Systems Of The Powergrid. How Does Power Get To Your Tea Kettle From The Power Plant
    - Bigezy
  • Thumbnail for the video - click to play

    ►

    You Won't Even Know It's Recording You!
    - Elaheh Samani
  • Thumbnail for the video - click to play

    ►

    A Safer Way To Pay - Comparing The Security And Integrity Of 21st Century Payment Systems
    - Chester Wisniewski
  • Video will not be published
    State Sponsored Stalking ?!
    - Paul Rascagnères
  • Thumbnail for the video - click to play

    ►

    The Imitation Game: Emulating Attackers
    - Wietze Beukema
  • Thumbnail for the video - click to play

    ►

    Using Network Miner To Reconstruct Network Traffic
    - Matthew Short
  • Video will not be published
    Bots: Can They Really Be Managed?
    - Diana Alvarado
  • Thumbnail for the video - click to play

    ►

    SOC It Up! - Common Frustrations And Solutions In SOC Teams Today
    - Jymit Khondhu
  • Thumbnail for the video - click to play

    ►

    Fixing The Internet's Auto-Immune Problem: Bilateral Safe Harbor For Good-Faith Hackers
    - Chloe Messdaghi
  • Thumbnail for the video - click to play

    ►

    Password Cracking; The First 500 Million
    - Jamie Riden
  • Thumbnail for the video - click to play

    ►

    The Little Phone That Could Ch-ch-chroot.
    - Mathew Evans and Jack Whitter-Jones
  • Thumbnail for the video - click to play

    ►

    Exploring Emotet, An Elaborate Everyday Enigma
    - Luca Nagy
  • Thumbnail for the video - click to play

    ►

    Turning Your Weapons Against You.
    - Andrew Blane
  • Thumbnail for the video - click to play

    ►

    Understanding Stress, Anxiety And Depression And How To Cope
    - Olga Zilberberg
  • Thumbnail for the video - click to play

    ►

    When The Magic Wears Off: Flaws In ML For Security Evaluations (And What To Do About It)
    - Lorenzo Cavallaro
  • Video will not be published
    Digital Intelligence Investigations
    - James
  • Thumbnail for the video - click to play

    ►

    Usernames, The Missing Piece: The OSINT Jigsaw Puzzle
    - Simon Hall
  • Thumbnail for the video - click to play

    ►

    Watching The Watchers: The Stalkerware Surveillance Ecosystem
    - Cian Heasley
  • Thumbnail for the video - click to play

    ►

    Powershell Is DEAD-Epic Learnings!
    - Ben Turner
  • Thumbnail for the video - click to play

    ►

    Stalkerware In Mobile Devices
    - Jessica Amery
  • Thumbnail for the video - click to play

    ►

    AWS Vs Azure Security
    - Paul Schwarzenberger
  • Thumbnail for the video - click to play

    ►

    Build To Hack, Hack To Build.
    - Chris Le Roy
  • Thumbnail for the video - click to play

    ►

    My First Program: A Pentesting Tool
    - Nina Fasel
  • Thumbnail for the video - click to play

    ►

    They Are The Champions: How To Build And Maintain An Effective Cybersecurity Champion Programme Within Your Organisation
    - Kevin Millwood And Jessica Barker
  • Thumbnail for the video - click to play

    ►

    We Take Your Security Seriously. Or Do We?
    - The Beer Farmers
  • Video will not be published
    ISIS Online: Junaid Hussain
    - Michael Jack
  • Thumbnail for the video - click to play

    ►

    Bug Bounties: Crowdsourcing Nosey Bastards
    - Jamie O'Hare
  • Thumbnail for the video - click to play

    ►

    Mission Assurance In Closed, Proprietary Systems
    - Josh De Boer
  • Thumbnail for the video - click to play

    ►

    Aletheia: GPU Accelerated File Carving
    - Corey Forbes
  • Thumbnail for the video - click to play

    ►

    Closed For Business: Taking Down Darknet Markets
    - John Shier
  • Thumbnail for the video - click to play

    ►

    Hacking RF: Breaking What We Can't See
    - Grant Colgan
  • Video will not be published
    The Keymaker
    - Maksims Luferovs
  • Thumbnail for the video - click to play

    ►

    Forensicating Windows Artifacts: Investigation Without Event Logs!
    - Renzon Cruz
  • Thumbnail for the video - click to play

    ►

    The Definition Of Madness
    - Ian Davies
  • Thumbnail for the video - click to play

    ►

    Inside Magecart: Their Web Skimming Tactics Revealed
    - Terry Bishop
  • Thumbnail for the video - click to play

    ►

    Offensive Pcap
    - Stuart McMurray
  • Video will not be published
    Frida The "Hooker"
    - Barnabas Sztan-Kovacs
  • Thumbnail for the video - click to play

    ►

    Vendor Data Science Buzzwords Hacked
    - Thordis Thorsteins
  • Thumbnail for the video - click to play

    ►

    CyberRange: An Open-source Offensive Security Lab In AWS
    - Thomas Cappetta
  • Thumbnail for the video - click to play

    ►

    Spear Phishing: From Linkedin To Loggedin
    - Alex Archondakis
  • Thumbnail for the video - click to play

    ►

    A Newbie's Talk On Mobile Dangers Through The Looking Glass
    - Sarah Kingham
  • Thumbnail for the video - click to play

    ►

    Automation In Application Security
    - Javier Dominguez
  • Thumbnail for the video - click to play

    ►

    Closing Remarks
    - BSides Crew