BSidesBristol 2019 June 20, 2019 to June 20, 2019, Bristol, United Kingdom

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Opening Keynote: We’re doing it all wrong – why we need to change our approach to cyber security Chris Ulliott N/A
Data Appropriation Through Organisation Infiltration Using Enhanced Integration and Truth Manipulation Tom Rigby Sash Rigby & Tom Farrant discuss and demonstrate the tradecraft commonly employed by his team ...
Emerging Threats, Hackers and Attackers: Stories from the SOC Dan Pitman Join us for the latest attack trends and threat insights from Alert Logic’s own SOC ...
People: The Strongest Link Emma W I’m going to be talking about people-centred security research in CESG and later, the NCSC. ...
Exposing Internet Protocol Theft Gaith Taha This presentation will identify a number of UK based Local Internet Registries (LIRs) that have ...
Cloud Security 1984 Andi Hudson In 1984, security in computer systems really started to develop, and so did the technology ...
Profiling the Attacker: Using Natural Language Processing to Predict Crime James Stevenson What does Minority Report, Black Mirror, and 1984 all have in common? Well, turn up ...
Bad Web Applications: Security Architecture and Pen Testing Horrors Martin Pill As a Security Architect and Pen Tester, I see a lot of designs for and ...
Irresponsible Disclosure Dylan Wheeler Dylan Wheeler was a member of the Xbox Underground international hacking group in 2011, the ...
From an 'IVI in a box' to a 'CAR in a box Ian Tabor Presented by Ian Tabor @mintynet, this shows how he built PD0 the Peugeot 208 electronics ...
iOS Apps Hacking Just Got Easier Tomer Hadad Imagine that you're using an iOS app which holds you back with some restriction. It ...
Security Enablement Sean Wright As companies and organizations adopt more rapid development and release methodologies, it is becoming increasingly ...
Heimdal Kerberos Authentication and Kerberos Attack Surface Sadi Zane This talk demonstrate advanced Kerberos based network attack in a hybrid Linux and windows none ...
Common Mistakes and Getting the Basics Right Nic Miller We keep reading how spending on cyber security is constantly increasing, there are more jobs ...
IoT from an Attacker’s Perspective Venkata Hareesh Peddiraju IoT has gotten a lot of traction lately and has found it’s applications widely in ...
Protecting £637 Billion Every Day: How the Bank of England Has Evolved from a Reactive to a Proactive SOC Jonathan Pagett The Bank of England (BoE) has evolved from a reactive SOC, very much focused on ...
Statistical Security for IoT (Short Talk) Abia Amin The number of Things (Internet of Things devices) is expected to grow to 22 Billion ...
Threat Hunting: The Difference between Safe and Sorry Alert Logic In today’s complex cybersecurity landscape, threats are becoming more sophisticated, frequent, and elusive. It’s no ...
Ghidra vs. The Cold War Chris A What does a 2019 reverse engineering tool, have to do with a processor from 1972 ...
MITRE ATT&CK Framework for Threat Hunting Seth Warnes Cyber Operations needs to be continually improving to stop attackers. The attackers are developing new ...
[Cancelled] A Journey into the Mind of the CISO Matt Denny All too often there's a gulf between Security leaders and their teams at the coal ...
Spotting the Adversary Using the ATT&CK Matrix: A Practical Approach Pete O A walk through of how the ATT&CK matrix has been applied as part of a ...
From Bedroom to Boardroom: How to Turn the Idea You Had at 1 AM into a Multi-Million Turnover Business Nicola Whiting Britain is a nation of inventors and in cyber security has this certainly proven to ...
Logging Made Easy Shane M Logging Made Easy is a set of scripts and documentation that installs Sysmon on a ...
Reverse Engineering for Threat Intelligence Vishal Thakur In this presentation, we focus on reverse engineering malware for the sole purpose of gathering ...
Pi$$ing Off an APT Ed Williams Red teaming is everywhere and everybody is doing it. Most organisations are not mature enough ...
Making It Rain: Cryptojacking Attacks in the Cloud Chris Doman We've seen a ton of compromises of cloud services the past couple of years to ...
Closing Keynote: Voodoo People David Hartley Please join us for our closing session to hear from the core team, see the ...