Meet and Share

With loads of people under one roof with similar values and interests - it's the perfect time to network and kick off the conversations.

No Sales Talks

Talks are judged on their own merit, so it's not important to work for a big company or be 'well known'. We actively want new speakers!

See Who Is Talking

BSides is all about collaboration, sharing what you know and supporting people in the industry - that means you! You can see the speakers below.

Changes Likely

As we live in interesting times, these talks may have to change / update at really short notice. We will do our best to keep you updated of any changes, but please bear with us! We are doing our best!!
Image

Annet Kabuye - In Person

Balancing technical security control with human factors

The digital age has presented the computer user with so much power, that they can make or break the organizational security. Cybercrime is on the rise and attackers are constantly devising newer ways of breaking into organizational networks, through exploiting human factors or technical vulnerabilities. Notably, IT and cyber security professionals have placed much emphasis on building and implementing technical controls which prevent known security risks at the expense of the human factors. It is imperative to take a holistic approach of strengthening both human factors and technical controls to ensure safety of digital assets. This talk will focus on the efficiency of a web-based application in creating cyber security awareness amongst small and Medium Enterprises (SMEs) to ensure that human factors are as strong as the technical controls.

Ali Kabeel - Remote Talk

Breaking the Giants With Application-Level Denial of Service Attacks.

Owing to the advances in Denial of Service (DoS) mitigation techniques and Intrusion Detection Systems (IDSes), high-volume DoS attacks are usually fairly easy to detect and thus can be faster to isolate and handle. To that end, hackers shifted their focus from high-volume attacks to application-level low-volume DoS attacks. Application-level DoS attacks are harder to mitigate because they arise from inherent vulnerabilities inside the targeted applications. In this talk, we aim to present some examples of devastating application-level DoS, including vulnerabilities found in gigantic companies like Snapchat. We hope that this talk will motivate more research in the field of application-level DoS and will aid the audience in getting a feel of what can cause their applications to be vulnerable to those types of attacks.

Steve Pye - Remote Talk

Here comes the SOAR.

SOAR is going to become as ubiquitous as SIEM and other platforms whether we like it or not. Brief talk to describe some hints and tips and suggestions (War stories?) from my last few years of trying to roll out enterprise SOAR solutions and the common problems that companies face.

Basically - SOAR is coming - it's cool - it can help - it can be fun?

Ignat Corchagin - In Person

Sandboxing in Linux with zero lines of code

Linux seccomp is a simple, yet powerful tool to sandbox running processes and significantly decrease potential damage in case the application code gets exploited. It provides fine-grained controls for the process to declare what it can and can’t do in advance and in most cases has zero performance overhead. The only disadvantage: to utilise this framework, application developers have to explicitly add sandboxing code to their projects and developers usually either delay this or omit completely as their main focus is mostly on the functionality of the code rather than security. Moreover, the seccomp security model is based around system calls, but many developers, writing their code in high-level programming languages and frameworks, either have little knowledge to no experience with syscalls or just don’t have easy-to-use seccomp abstractions or libraries for their frameworks. All this makes seccomp not widely adopted—but what if there was a way to easily sandbox any application in any programming language without writing a single line of code? This presentation discusses potential approaches with their pros and cons.

Ed Tucker - In Person

I don't want to spoil the party

The best thing we can do as an industry is turn the advice upside down. Stop lauding people who've not done the job, stop promoting sales driven content, and stop pushing a one size fits all mantra. This talk will explore just why we should ignore such approaches that have been the backbone of the industry for decades if we want to make actual progress in our defence of businesses and the people within. Each business is unique, so be different from the madding crowd.

Emily Muraguya - Remote Talk

How to sell Cybersecurity to the board

In several important steps, this tallk addresses the common mistakes made by different actors to move cybersecurity projects to their management or direction. Some key points:

1. Empathy is the basis of everything. Have the ability to put yourself in the other's shoes.

2. No technical language: Spyware, DDOS, HSM, OCSP, Radius etc.

3. Adopt a language and methodology familiar to C-levels. Your message will be heard by your audience only if it has adapted to it.

4. Your audience is sensitive to risks and impacts and not to malware variants and complex threat scenarios.

5. Contextualize your study based on business prospects.

6. Demonstrate ROI to the CFO to show it that the project is not a cost but an investment.

LeanIn - Remote Talk

Breaking Barriers-Women in Cybersecurity

Warriors not Worriers

Breaking Barriers - Women in Cybersecurity is a circle of Lean In,

OUR VISION

We aim to build Cyber Champions in the Industry by providing a place where existing/new women in CyberSecurity can envision to grow as a leader.

OUR MISSION

We provide a safe space for women in the industry to:

  • grow,
  • build confidence,
  • manage work stress, and
  • ideate to evolve as leaders in the ever-changing technology in Cybersecurity.

WHAT DO WE DO
We believe in quality over quantity. Engaging women and male allies through social media platforms like LinkedIn, Instagram, Twitter, etc we encourage our members to come forward, connect with renowned faces in the industry and grow together.

Website: https://leanin.org/

LinkedIn: linkedin.com/company/breaking-barriers-women-in-cybersecurity-lean-in-circle/
Twitter: @barriers_in
Instagram: https://www.instagram.com/leanin_breakingbarriers/

Bullies Out - Remote Talk

Working to Inspire Change. 

We work to reduce the impact of bullying behaviour and the harm it causes through programmes, resources and services that:

  • Increase confidence and self-esteem
  • Build communities of support
  • Reduce isolation and loneliness
  • Promote positive and respectful relationships
  • Challenge attitudes and behaviours
  • Support resilience and wellbeing
  • Help children understand, recognise and respond to bullying behaviour

Website: https://bulliesout.com/

Facebook: https://www.facebook.com/BulliesOut/
Twitter: https://twitter.com/BulliesOut
Instagram: https://www.instagram.com/bulliesoutuk/

RefugeeWomen Connect - Remote Talk

Refugee Women Connect exists because women asylum seekers and refugees face inequality and are denied social justice.

Refugee women have to overcome many barriers to accessing services and support and even when asylum seeking women have been able to get support they face being moved on at short notice to another area where they have no support networks. The women engage with us at an important turning point in their lives where they have left an abusive or conflict situation and are trying to deal with the huge change to their lives that this brings about at the same time they are trying to navigate the complex asylum process.

Website: https://www.refugeewomenconnect.org.uk/

LinkedIn: https://www.linkedin.com/company/refugeewomenconnect/
Twitter: https://twitter.com/Refugee_Women
Instagram: https://www.instagram.com/refugeewomenconnect/
YouTube: https://www.youtube.com/channel/UCmw_rDmF5V5zScf-FTD4YxQ

Oliver Creed - In Person

RSS & Twitter to Elastic (or A day in the Elastic)

A project I undertook was to using logstash pull RSS and Twitter data into elastic - https://github.com/the-pixel-hunter/Security-feeds-to-Elastic (not 100% finished). I would want to talk about the why, the setup, the challenges, and then show the results with some of the many use cases.

Jon Spriggs - In Person

Automating OS Hardening (with a little help from my friends - featuring CIS Benchmarks and Ansible).

Showcasing two tools which should be in the back pocket of any Blue Teamer, this talk will show how to implement the CIS Benchmarks on a virtual machine, using Ansible (other automation options are also available). Center for Internet Security (CIS) Benchmarks help ensure that weaker default options for Operating Systems, Virtualization Environments and high profile Applications. Ansible is a highly extensible automation engine from Red Hat, that targets desktop and server operating systems, including Windows, Mac and Linux, but also network appliances (like FortiGate firewalls, Cisco Routers and Switches), and applications (including GitLab, ServiceNow, Azure and OpenStack).

Jon has a full-time day job, but also finds time to blog, podcast, stream automation content on Twitch and youtube, and speak at conferences, like this one. His website is at: https://jon.sprig.gs

Talk links:

CIS Benchmark: https://www.cisecurity.org/cis-benchmarks/

Ansible: https://ansible.com

Presentation: https://jon.sprig.gs/blog/post/slideshow/automating-os-hardening

Project: https://github.com/Ansible-System-Hardening-and-Auditing

Steven Lodge - In Person

Speaks4me has an on-screen speak button that provides text-to-speech audio output of the word or phrase to enable the user to intentionally express themselves.

We all take things for granted - every day - car will always start, mobile phone is charged and working, but what happens if that suddenly stops...? Can you try to take a few moments to imagine how you would feel if you couldn't speak or communicate.... Go on - take a big, deep breath, close your eyes and give it a try.... It's a very scary thought isn't it - not being able to express yourself, to ask for things you want or need, to engage with those around you - family, friends, teachers, carers, the public. So what would this world be like for a child or disable or vulnerable person - even more terrifying - right...? Well that's the world my 22-year-old, severely disable son, Callum who lives in that world everyday and that we, his family share with him too...along with those who meet him through his life. I'm a qualified electronics and software engineer, who progressed into management and consultancy roles over the years, but deep down I'm still a techie problem solver - a geeky Dad - so I challenged myself to see if/how I could help my son and all those million's of other non-verbal children and adults in the UK, Europe and around the World to communicate. So I created and invented speaks4me which uses a regular table device with digital pictures or photos that you drag & drop on the screen within a GUI to create a single word or series of words to create basic sentence. Speaks4me has an on-screen speak button that provides text-to-speech audio output of the word or phrase to enable the user to intentionally express themselves.

Glen Pegden - In Person

4000 Holes in Blackburn, Lancashire – Defence at Scale. The unsexy world of prevention!

Sure, Pentests and DFIR get all the fun war stories (and best con talks), but prevention is better than cure and as an industry we suck as getting the basics right when it comes to prevention. So come and listen to somebody who lived a lifetime in sleepy pastures of Asset Management & Audit, Vulnerability Management and even with a little dash of Risk Assessment and Threat Modelling, so you never have to.

  • Learn how building, populating and more importantly getting everyone using an Enterprise Grade CMDB/Asset Database from scratch is ACTUALLY possible.
  • Marvel at how the seemingly endless well of vulnerabilities spat out from a Vuln Scanner can be tackled in an achievable prioritised way your engineers won’t hate
  • Understand why good security architecture is worth 100 pentests, bug bounties or blinky boxes (and will save your ass far more often).
  • Be Enlightened as to how reporting can save your bacon and Excel can be your most important tool when it comes to preventing breaches. And if you’re an attacker, come and learn how to take advantage of the fact that most places absolutely suck at all of the above.

Vic Harkness - In Person

Come together, right now, over mesh networking.

This talk describes Vic's efforts to learn more about mesh networking. Come learn about the rabbit holes she has been down whilst setting up her home test mesh network using the Batman routing protocol, including reminders of the OSI model and how data travels through the TCP/IP stack. This talk will also discuss more generally what mesh networks are, what they can be used for, and what sort of security threats they can face. From attending this talk, you would gain useful pointers on how to set up your own home mesh network using Raspberry Pis so that you can carry out your own research; you may also be inspired to learn more about novel routing protocols and niche mesh network attacks!

Simon Cole - In Person

Let It BlEeed (You can't always get what you want).

Not the Beatles but the Rolling Stones, best I could do. (happy to use Beatles song if someone can suggest). This is my first CFP response but have previously been on Panels, presented a bit. Not sure what level of detail is required. Also very happy to take feedback. There is very little technical content much more on the behaviours and techniques to "get what you need". The context for the talk is I need to get people to deliver my stuff, whether that is actual secure code, fund my new toolsets or changes to processes. It is very rare even in regulated environments that you have a mandate and a blank cheque. So looking at some of the things I wish I had been told years ago, rather than learning along the way. The main areas of focus are Company context, Language, Building technical security culture including Threat Modelling , Opportunistic improvement, finally look at the behaviours that solution proposals can drive which are not as expected

David Cooke - In Person

Everybody’s got something to hide, except for me and my incident response plan.

While the vast majority of senior stakeholders in businesses (from SME to FTSE) recognise the benefit of incident response plans, the majority of organisations don’t have one. Of those that do, the vast majority have never practiced them or considered if the plans work in practice. In this talk, I consider what the legal obligations are around incident response plans and around breach response and explain where failure happens and, more importantly, how it could have been avoided. We are now hurtling towards a position in which cyber security incident response is not just important for business risk, but an issue that represents regulatory, litigation, and supply chain risk. These incident responses will be disclosed and will be publicised. Are you ready for your soiled linen to be sorted in public? Everybodys got something to hide, except for me and my incident response plan.