BSidesLondon 2018 June 5, 2018 to June 6, 2018, London, United Kingdom

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Graduate Career Panel David Chismon , Ryan King , Emma Gillman , Tushal Modessa Panel discussion on graduate related issues such as Is SOC still the best entry level ...
Experienced career channel - future of you David Chismon , Ross Mckerchar , David Ferbrache , Luke Vile This will be a panel discussion with Q&A on the future of the industry covering ...
How to get started in Cyber Security Phill Kimpton "in 2015, fed up with my direction in life, I set a goal that i ...
Working with and thoughts from an internal recruiter Tom Williams , Dan Dale Tom Williams from Context and Dan Dale from Tenable are both internal recruiters for their ...
Working with and thoughts from a recruitment agency Ryan King , Hawker Chase Ryan King from Hawker Chase/ARM and Dan Hathaway from Secure Source have 30 years industry ...
Career Track - What Hiring Managers look for and the industry (Talks from Sophos and KPMG) William Barlow , Craig Jones Criag Jones, Senior Security Engineering Manager from Sophos and William Barlow, threat assessment and response ...
Rushing to Market: The IoT without Security James Wistanley An review of two IoT devices I have examined and found security vulnerabilities in (unreleased). ...
Breaking the Bodyguards: Tech Enabled Crime Chrissy Morgan This talk looks at how modern day criminals are capable of using technology against Close ...
Understanding your business risks are key Paul Holland Each business faces different risks, understanding what is important to your business helps to shape ...
How to: Actually attack computers at cafes Felix Ryan The information security industry has claimed that unencrypted WiFi is a bad thing for a ...
Web browsing from the car, what's the worse that can happen? Ian Tabor Car hacking and the discovery of a vulnerability in a In Vehicle Infotainment Unit, showing ...
From n00b to 1337: A CTF Story Sophia Mccall This talk will be about how CTFs are used in and are apart of the ...
An approach to implementing a workstation host based firewall Matthew Bullimore How to pragmatically implement a host based firewall on workstations to 1) protect machines while ...
Mitigating ROP Attacks David Baker Return Oriented Programming (ROP) poses a significant threat to modern day systems as it is ...
Continued fractions and breaking RSA Edwin Godfrey Wiener's attack is a well-known attack on RSA, which applies when the private key is ...
Connecting the dots: A beginner's experience of threat actor tracking Keith Short This talk will cover two main topics: - An overview of a threat actor I ...
Stop training, start marketing. Jessica Payne N/A
Structured analytical techniques for cyber security Gabriel Currie Structured analytical techniques are commonplace in the intelligence and security community, but are yet to ...
Diggin Deep into Newly Created Domains Andrew Freebrey I ask "What can we learn about the current threat landscape from information derived from ...
Threat Hunting 101 or: How I Learned to Stop Worrying and Love the data Brett Calderbank A lot of people new to infosec see the sheer sexiness of red teaming and ...
Psychical Pentesting and how to catch them? April M Jones 101 to psychical Pentesting and basic skills of using public sources to be successful and ...
Unlocking Opportunities in Cyber Security James Hickie Are you doing the right things to break into the industry? A talk detailing the ...
One year in security - what was that thing called again? Joel Potts I'm approaching my 1 year mark in infosec however, rather than gradually building the knowledge ...
Information Security - Lessons learnt from Military Intelligence David Sirignano Currently writing a dissertation for my part-time MSc Information Security on the topic of lessons ...
How I got access to your organization's private Git and production infrastructure / My Research on Misconfigured Jenkins Servers Mikail Tunç In this talk, I will be covering some research I did whereby I discovered tens ...
Analysis of the Black Market Exploit Trade Adam Bumgarner Malicious actors routinely post advertisements to criminal marketplaces for exploits affecting an array of products ...
Why InfoSec needs rookies like us. Aimee Laycock Know how to exploit your skills, curiosity and interests to build and improve security culture ...
Keynote: State of The Net Mikko Hypponen Technology around us is changing faster than ever. We've already become dependent of our digital ...
Hacking SCADA - How We Attacked a Company and Lost them £1.6M with Only 4 Lines of Code Matt , Mike Hacking SCADA, or more commonly ICS is serious business, unlike other areas of offensive security ...
OpSec for Hackers - What You Need to Know to Not Get Caught, Leveraged or Pwned Porthunter They say Crypto is hard, OpSec is harder. This talk will combine proper operational security ...
How to take over a production system in the cloud Paul Schwarzenberger One misconfigured line of code results in anyone in the world being able to destroy ...
How I break into Casinos, Airports and CNI: The Basics of Social Engineering Chris Pritchard This talk will be about the basics of social engineering into a client’s site/office. I ...
Deep Dive on the Dark Web John Shier Regardless of skill, anyone with an internet connection can stitch together a complex attack with ...
Circumventing egress filtering by exploiting HTTP “transfer-encoding: chunked” for faster web shells Lorenzo Grespan During a red team engagement we breached a web server that only allowed HTTP inbound ...
Breaking into Embedded Devices and IoT Security Andrew Costis Embedded devices and IoT have received a lot of bad press over recent years. The ...
Random Problems in IoT Mark Carney Random Numbers are important. Really f***ing important! Yet, they are so often misunderstood. Decent Random ...
Solving Threat Detection Alex davies Why do organisations fail so badly at threat detection? Despite chucking tons of cash at ...
Urban Air Mobility (UAM) Candice Carter The advancement of Unmanned Aerial Vehicles / Systems has matured at a rapid rate. There ...
Defending the Defenders: Case studies of success and failures from a security team David Chismon Defending an organisation from all threats, be they physical, personnel, or cyber, is not easy ...
BotProbe - botnet traffic capture using IPFIX Mark Graham IPFIX is the ratified standard for flow export. IPFIX was designed for security processes such ...
Hacking the Drones Aatif Khan Hacking the Drones will cover security issues of some of most popular drones and how ...
The Insider - Users Neil Lines What can your internal users do? Over the years I have come to the conclusion ...
Travel with Underground Services: ecosystem exposed Vladimir borisovich Kropotov Unfortunately today, hackers and cybercriminals have holidays, days off and vacations too - and It ...
Profiling the attacker - using offender profiling in SOC environments James Stevenson It’s been said ‘‘Intrusion analysis is as much about tcpdump as astronomy is about telescopes". ...
The green padlock of doom, or why no one trusts us anymore Meadow Ellis I want to talk about trust (or lack of it) in technology, conflicting messages and ...
How to get started in Cybersecurity John Stoner Over the course the last few years, I have mentored several people who are just ...