-
How To Avoid Facial Recognition Software
- Mairi MacLeod
-
Decriminalization Of Ransomware
- Bigezy
-
This Is How The World Ends
(Not With A Bang, But With A FUD)
- James Bore
-
Chaos Engineering: Break It On Purpose
- Morgan Carter
-
Stealing Hearts, Securing Minds:
Gamifying Pentesting Methodology
- James Riley
-
Making Big Datasets Searchable
- Calum Boal
-
How We Hacked Your Billion Dollar
Company For Forty-Two Bucks
- Jamie Riden
-
CrowdSec, A Crowd-based Approach
To Infrastructure Defense
- Klaus Agnoletti
-
X-Com - Editing Save Game
Files Is Still Strategy
- Paul Williams
-
Tokyo Takedown Reviewed:
A International Tour To Japan.
- Ben Ellis
-
When Encryption Fails
- Eva Summerfield
-
Defeating AV And EDR Solutions In User-Land
By Chaining Well-Known Deception Techniques
- Alessandro Magnosi
-
Pushing Left - How We're All Doing It Wrong
(And How We Found A Better Way In An Unexpected Place)
- Glenn Pegden & Stephan Steglich
-
To Pwd Or Not To Pwd
- Antonin Kanat
-
Getting Started With CTF’s
- Jeff Moye
-
OS Fingerprinting From
Scratch (Or) Offensive Scapy
- Harry Williams
-
GitOops! All Paths Lead To Clouds
- Alex Kaskasoli
-
Audit And Compliance Headaches - Can Data
You Already Have Provide The Answer?
- Chris Burtenshaw
-
Decoding PEM Keys
- Joseph Hollingworth
-
MITRE D3FEND
- James Gibbins
-
Becoming The Enemy:
A Transition From Blue To Red
- Alex Close
-
Practicing Safe Sex(t) - With Xxxtra Content
- Tia C
-
Credential Attack Recon Detection: How Current UEBA
& NID Tooling Fail And How To Reduce False Positives
- Abi Waddell
-
Introduction To Red Team Tooling And Opsec
- Marwan El-Gendi
-
DFIR - Don't Forget Your Roots!
- Sabastian Hague
-
Charge My Car, For Free, Forever!
- Vangelis Stykas
-
From Paupers To Queens:
The Tale Of Two Wannabe Hackers
- Security Queens
-
Big Data Lake, Big Data Leak
- Ben Caller
-
How To Build A Strong
Data-Driven Organization?
- Saman Fatima
-
F*** Around & Get Found Out:
Disinformation As A Service
- Andy Gill
-
Reflections On Trusting Zero Trust
(Or Why I Have Zero Trust In Zero Trust)
- Tim Wadhwa-Brown
-
The Challenges Of Remediation
During A Cyber Incident
- Johanna Strachan
-
Top Down Security:
Management View Of Security
- Alex Sromek
-
Are You A Cloud Security Personnel?
- Helen Oluyemi
-
Securing Cloud Delivery Pipelines - Findings
From A Blue Team/red Team Security Simulation
- Foo Meden
-
Security For Techies
- Kushagra Vyas
-
Ready For (Nearly) Anything: Preparing
Your Organisation For A Cyber Incident
- Gabriel Curry
-
JWTs And Why They Suck
- Rory Mackie
-
Think Zero Days Are Your
Your Biggest Risk - Think Again
- Ciara Campbell
-
Forensics As A Service: Building Automated,
Scaleable, And Accessible Analysis Environments
- James Jackson
-
Closing Notes
- BSides London Orga