The speaker’s profile picture
Andrea Jones

Andrea started practicing Information Security in the public sector, also holding the position of Data Protection Officer, and is currently a Lead Information Security Analyst with Sainsbury's where she works with squads of developers to ensure products are designed and delivered in line with company policy.

  • Making Consistent STRIDEs with Threat Modeling Templates
The speaker’s profile picture
Ben Docherty

Ben comes from a background of engineering with the beginning of his in IT Support and progressing his way up to been a engineering specialist in Sentinel for Adarma. Ben is a fire spinner, a battle bot builder, and founder of BSidesNcl and InfoSecBattleBots.

  • How I leant to love my Superpower
The speaker’s profile picture
Chris Pritchard

Chris has worked in a range of industries, most notable of which are Critical National Infrastructure (CNI), and leading edge design and manufacturing (Dyson). Doing so has given Chris a very varied array of knowledge, from penetration testing robot vacuum cleaners, to designing and testing secure ICS/OT networks. During Chris’ time at Dyson, he was involved in developing the global security team and performing internal penetration testing. Chris was also heavily involved with securing the design of Dyson’s current and future internet connected appliances, and corresponding smartphone applications. Chris is an Adversarial Engineer (aka penetration tester) at Lares which involves him acting and thinking like a genuine attacker to compromise client networks. Chris’ skill set also includes Social Engineering, and he has successfully gained access into CNI, Airports and Casinos, which are regarded are some of the most secure facilities in the industry. Chris has been lucky enough to have spoken at DefCon twice, and many different BSides' across the country.

  • How to bypass million dollar cyber security solutions - War Stories of a Social Engineer
The speaker’s profile picture
Daniel Walters

Dan comes from a background of response with the beginning of his career starting in in a multi client SOC and progressing his way up to been a consultant specialising in financial clients as Adarma. Dan is an avid hiker who loves a swim in the highland lochs (even in winter).

  • How I leant to love my Superpower
The speaker’s profile picture
Dr Emma Taylor (She/Her)

Dr Emma Taylor CISSP CEng is on a mission to bring cyber to system safety. Career mature in space, energy and transport, and a Royal Academy of Engineering Visiting Professor at Cranfield University in Digital Safety and Security, this is her first presentation at a security conference. Fun fact… Once a space apprentice in Bristol, one computer model she used is now in a NASA Shuttle museum

  • Clash of cultures? Bringing cybersecurity into (aero)space safety
The speaker’s profile picture
Harri Renney (He/Him)

Harri Renney holds a PhD in Computer science from the University of the West of England. Since graduating, Harri has worked for Kaze Consulting Ltd where he works with clients to implement innovative technologies backed by evidence based research into their organisations.

  • Building Effective Vulnerability Risk Scoring Systems
The speaker’s profile picture
James Stevenson (He/Him)

James is a security researcher with over 6 years experience in the computer security industry. James primarily works in vulnerability research and software engineering, however, also works part time on a PhD which intersects machine learning with understanding ideologically motivated cyber crime.

  • Using Machine Learning To Identify Threat Actors Online
The speaker’s profile picture
Jean Snyman

Jean is a Research Engineer at Hewlett Packard Enterprise working on platform security technologies. His other areas of interest include applied cryptography, identity and data privacy. Earlier this year, Jean was honoured by the Chartered Institute for Information Security (CIISec) with the Fred Piper award, in part due to his contributions to the field while a student.

  • Securing Protocols with (Not So) Formal Methods
The speaker’s profile picture
Joe wells

After overcoming homelessness and an early departure from education, Joe embarked on a transformative journey through sales and education. A self-taught cyber enthusiast, Joe talked his way into university studies in applied cybersecurity. Today, he volunteers and is even building his own cyber awareness platform.

  • Growing up Digital: Cyber Awareness for Today's Youth
The speaker’s profile picture
Liam Follin (He/Him)

Liam Follin is an Application CHECK Team Leader and all round penetration testing enthusiast. He loves building new tools, hacking things, and nice scotch whisky. Not necessarily in that order.

  • Domain Name Stupidity
The speaker’s profile picture
Lisa Forte (She/Her)

Lisa Forte is a speaker, trainer, entrepreneur and high altitude climber! Lisa is an expert in running cyber crisis simulations and helping companies build their operational resilience to cyber attacks.

Lisa is the co-founder of Red Goat Cyber Security and passionately supports the “tech for good” philosophy helping smaller charities stay secure.

Lisa has starred in several documentary films and is a regular on BBC news, radio and in national papers. In 2020 Lisa co-founded a “cyber for good” movement called Cyber Volunteers 19. The group provides pro bono help and advice to hospitals around Europe during the pandemic and amassed almost 3000 volunteers.

Lisa is the co-founder of Red Goat Cyber Security who specialise in cyber crisis simulations and building operational resilience when it comes to cyber attacks. They also help companies with awareness training. Red Goat are an exciting company who are changing the way we view preparing for attacks and are coming up with creative solutions for companies around the world.

Lisa also climbs some of the world's highest peaks and travels to remote places to find untouched climbing spots and adventures.

  • You're gunna need a bigger boat
The speaker’s profile picture
Marius Poskus

Marius Poskus VP of Cyber security for a global fintech organisation, expertise in the SOC architectures, Cloud security engineering and architecture, building AppSec programs and DevSecOps. NED for multiple cyber security product companies binging exciting products to the SME market

  • Human Error breaches are bullsh*t
The speaker’s profile picture
Melissa Augustine Goldsmith (She/Her)

Melissa Goldsmith has been dabbling on the defensive side of security since 2007 when memory forensics was running strings. She is a full time threat hunter for NBCUniversal and would love to visit every lido in the UK.

  • API Scraping for Swim & Profit
The speaker’s profile picture
Rosalind Grindrod

Rosalind has been working within the security industry since 2017 and has worked across several industry verticals. Rosalind currently works within a software development firm called Opencast Software where she is head of Security Services and works to provide secure development offerings to her clients.

  • Cognitive Defenders: How AI Transforms Cyber Security
The speaker’s profile picture
Ryan Pullen

Ryan Pullen has gained extensive experience over his 10 years in cyber security and is currently holding the position of Director of Cyber Security, for the multi-award-winning IT & Cyber Security provider, Stripe OLT. He leads a team of over 25 security engineers, across a range of security disciplines - from incident response and offensive security to open-source intelligence and managed security operations. Ryan was recently a nominee for Entrepreneur of the Year 2022 at the Go:Tech Awards, he's been highlighted as an influential speaker by TEDx for this recent talk 'How clicking a link can cost millions' and is a regular speaker at security events across the UK, recently speaking at the 2023 SANs Leadership Summit. Ryan aims to reinforce the importance cyber security in an evolving digital world, with a mission to foster a culture of trust, to effectively defend against cyber threats.

  • Working Against The Clock: Cyber Security - The Infinite Game
The speaker’s profile picture
Sam P (She/Her)

The SWRCCU investigate cyber crimes affecting South West organisations. We have dedicated Cyber Protect Officers who provide free and impartial cyber security guidance, workshops and resources to organisations of all sizes and sectors. This is a service offered both by ourselves and your local force’s cyber crime unit.

  • Cyber Crime Case Studies: Key insights and lessons learned
The speaker’s profile picture
Sarah Connelly (She/They)

Sarah is a Lead Cyber Security Specialist working in Bristol, with a background in operational risk management. They are currently a member of ISC2 (Certified Secure Software Lifecycle Professional) and have a specific interest in secure software engineering and web application security. In conferences, they can be found at the sticker table or in the vicinity of snacks.

  • Not Another AI Talk
The speaker’s profile picture
Seb Coles

Seb is a DevSecOps transformation specialist, and is Head of Application Security for LRQA, a global assurance and cyber security services company. Seb is a software engineer by trade, working in several lead engineer positions before moving into information security to help engineering teams build secure products. Since then Seb has led several DevSecOps transformations working previously at Clarks, Veracode and ClearBank – where Seb was a senior engineering manager. At Clear Bank, Seb built the security engineering function from the ground up over a two year period, scaling the function to protect a digital cloud bank and being awarded Highly Commended at the 2023 Computing Awards for DevSecOps implementation.

  • DevSecOps Leadership - Zero to Hero
The speaker’s profile picture
Seth

Spent a few years protecting various Critical National Infrastructure companies from Cyber Attacks. Performed roles in Architecture, Engineering and Operations. 6 months focusing on Artificial Intelligence, Machine Learning and Generative AI.

  • Securing AI
The speaker’s profile picture
Shahnoor Kiani (He/Him)

Shahnoor Kiani is a London-based security consultant at WithSecure specialising in Cloud Security. He comes from a cloud development background and has been researching applying OSINT techniques to cloud assets with the goal of identifying misconfigured cloud assets exposed to the internet. This interest has led him to research AWS Cognito, since he believes cloud-based identity providers present an emerging threat to companies who do not manage their assets properly. Outside of work he enjoys cooking and baking. He also skates occasionally and enjoys singing and playing the guitar.

  • Hey - doesn’t that cloud look like all your data? Current and novel methods of finding exposed cloud assets
The speaker’s profile picture
Wayne May

Wayne May has been a part of the antiscam community since 2005 and has run ScamSurvivors.com since 2012. The site has been referenced by such organisations as the Better Business Bureau and Bristol University. Wayne has appeared as an expert in media around the world, including CrimeWatch, Victoria Derbyshire, Scam Interceptors, Y Byd ar Bedwar and both BBC and ITV news programs in the UK.

  • Everything online can be faked. Here's how.