-
Opening Remarks
- BSides London Orga
-
From Chaos To Calm:
Mastering InfoSec Audits
- Sadik Miah
-
TryHackingMy Way From Cyber
Sales To Cyber SOC (Rookie)
- R4ck4tt4ck
-
A Technical Evaluation Of Real-World Passkey Security:
Why They’re The Best Chance We Have
- Dave C - NCSC UK
-
5 Gaps Exposed In 30+
Real-World Tabletop Exercises
- Ashu Savani
-
Living On The Edge: Abuse Of
Microsoft Edge For Persistence
- Alex Brown
-
Beginner’s Guide To
Malicious Browser Extensions
- Kush Pandya
-
Tap, Pay, And Pray
- Praneeth
-
If I Can Do It, So Can They:
Lessons From Building A Phishing Simulation
Tool And The Rise Of Phishing-as-a-Service
- Ada Domanska
-
Talking Cyber To The Boardroom:
What I Wish I Knew Sooner
- Lee Ward
-
Digital ID:
A Success Story Or Dystopian Nightmare?
- Kinga Kaiserin
-
Self Pwning
- Sam Macdonald
-
Tracking North Korean
hreat Actor Infrastructure
- Will Thomas
-
An Off-The-Cuff Filler Talk
- The Mentor Of @CloudWhistler
-
When Incidents Get Physical: A View Of
Incident Response In Critical Infrastructure
- Akash Sandhu
-
Breaking In, Standing Tall:
A Rookie’s Guide To Confidence In GRC
- Funke Omolere
-
Residential Proxies And The
Line Between Use And Abuse
- Sandra Cantero
-
Google Pay, Drug Bots, And SIM Swaps:
How Old Leaks Power New Attacks
- Sarit Yerushalmi & Ron Masas
-
Playing Peekaboo With
Runtime In CI/CD Pipelines
- Patricia R
-
Phishing, Upgraded - TokenFlare:
The Little Serverless AiTM Framework That Could
- Sunny Chau
-
Where Did The Organiser Go?
When The Conference Doesn't Run As Planned
- Cooper
-
Hunt At Scale: Fingerprinting
Threat Actors Across The Web
- Stephen Doyle
-
Phish And Chips:
Tactics, Tales And Takeaways
- Stefan Bargan
-
Cloud & Containers:
The Security Puzzle That Locks Tight
- Ashley Barker
-
Breaking DNA:
Cooking Malware In The Lab
- Ram
-
Cybersecurity For The Non-Hacker:
Protecting Systems Before It’s Too Late
- Ozonuwe Onyenike
-
Making Malware Analysis Less Scary
- Resetti
-
Open Sesame:
All Your Doors Are Belong To Us
- KevTheHermit & Benything
-
Using LLMs For Vulnerability Discovery:
Hacking Like Humans (Without Humans)
- Jeevan Jutla
-
Sorry, Did You Say Millions Of Sessions?
How Cheap Kits Fuel AiTM Attacks On Microsoft 365
- Joshua Rawles
-
Disability And Accessibility
In Cyber Security
- Deepan Shah
-
Persistence Pays:
From Flames To Firewalls
- Oliver Ellis
-
Does The Fog Ever Stop?
Testing Without All The Answers
- Ehren Osborne
-
It Takes 10 Minutes To
Cripple A Ransomware Gang
- Cristian Sindile
-
Always Cloudy In Chengdu: Inside The
China Nexus And The Hunt For An Adversary
- Craig Jones
-
Anyone Can Hack APIs: A Crash Course
For Pentesters And Bug Bounty Hunters
- Alex Olsen
-
THICC Clients - No Admin, No Permissions, No Problem!
Reverse Engineering Your Way To Application Admin
- Harry Williams
-
ClientAuth Certificates Everywhere:
When Your CA Becomes The Attack Surface
- Ben Lintern
-
SAPPIN’ The Enterprise:
Breaking What No One Else Pentests
- Jonathan Pake
-
From Pipelines To Problems:
My Early DevOps Lessons In Security Culture
- Prevail Uzodinma
-
Is AI Ready For AML In DeFi? A Look
Into Transaction-Level Risk Analysis
- Yash Nimbalkar
-
From Silent Threat To Visible Danger:
IPv6 Attacks Inside Corporate Networks
- Felix Meggison
-
Applying Cybersecurity To Cognitive Defense:
Too Much Information, Noise, Critical Ignoring, And Bullshit
- Winn Schwartau
-
Your Board's Perspective On Cyber
- Jessica Figueras
-
From Startup Speed To Security Mindset:
My Shift From Dev To Infosec
- Keleigh Berenger
-
When Java Plays Unsafe: How A Single
Mistake Can Break Memory Safety
- Thomas Leplus
-
Governments' Guide To Social Engineering
- Mario Khawam
-
Hacking Humans:
A Nurses Perspective
- Emma
-
Why Bother? Regulating Operational Technology
Beyond Critical National Infrastructure
- Owen
-
How Not To Become A Red Teamer
- Neil Lines
-
You Scored 46
- David McKenzie
-
EmailShell - A War Story On Leveraging Server
Side Template Injection (SSTI) To Hack Into GCP
- Filip
-
Amadey Malware Analysis:
How Digital Forensics And A Batch Script Helped
Me Unlock The Mystery Of The Infection Chain
- Ataur Rahman
-
Bridging LAN And Cloud: Actionable
Security Tips For Every Defender
- @CloudWhistler
-
Closing Remarks
- BSides London Orga