{"$schema": "https://c3voc.de/schedule/schema.json", "generator": {"name": "pretalx", "version": "2026.1.0.dev0"}, "schedule": {"url": "https://pretalx.com/bsides-exeter-2025/schedule/", "version": "1.0", "base_url": "https://pretalx.com", "conference": {"acronym": "bsides-exeter-2025", "title": "Bsides Exeter 2025", "start": "2025-04-26", "end": "2025-04-26", "daysCount": 1, "timeslot_duration": "00:05", "time_zone_name": "UTC", "colors": {"primary": "#171717"}, "rooms": [{"name": "Auditorium", "slug": "3790-auditorium", "guid": "566ec2e8-2700-53fd-a428-98eb2a75f908", "description": null, "capacity": null}, {"name": "Seminar Room 1", "slug": "3792-seminar-room-1", "guid": "07acacbc-30fd-5d10-adf4-2409a3cfaf83", "description": null, "capacity": null}, {"name": "Seminar Room 7", "slug": "3791-seminar-room-7", "guid": "26abe7f8-2439-5c0e-b8af-a92563410428", "description": null, "capacity": null}], "tracks": [{"name": "Purple", "slug": "5427-purple", "color": "#9340ff"}, {"name": "Red", "slug": "5428-red", "color": "#ff0022"}, {"name": "Blue", "slug": "5429-blue", "color": "#0000ff"}], "days": [{"index": 1, "date": "2025-04-26", "day_start": "2025-04-26T04:00:00+00:00", "day_end": "2025-04-27T03:59:00+00:00", "rooms": {"Auditorium": [{"guid": "3b166551-fbe0-5782-932b-af81a877975c", "code": "7QKCSC", "id": 66926, "logo": null, "date": "2025-04-26T09:00:00+00:00", "start": "09:00", "duration": "00:40", "room": "Auditorium", "slug": "bsides-exeter-2025-66926-accelerating-progress-shifting-from-a-reactive-to-proactive-approach-in-cybersecurity", "url": "https://pretalx.com/bsides-exeter-2025/talk/7QKCSC/", "title": "Accelerating Progress: Shifting from a Reactive to Proactive Approach in Cybersecurity", "subtitle": "", "track": "Purple", "type": "Keynote", "language": "en", "abstract": "Anticipatory governance in cybersecurity refers to proactive, forward-thinking strategies for managing cyber risks and enhancing resilience. It involves identifying potential threats, vulnerabilities, and future opportunities and challenges within the cybersecurity landscape, then preparing for them in advance. Rather than reacting to security incidents after they occur, anticipatory governance focuses on predicting and mitigating risks before they materialise. This talk will explore the key elements of anticipatory governance in cybersecurity, offering actionable insights for security practitioners. By embracing anticipatory governance, organisations can strengthen their security posture and navigate the increasingly complex digital ecosystem with agility, resilience, and trust.", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"code": "7HVDR3", "name": "Heather Lowrie", "avatar": "https://pretalx.com/media/avatars/7HVDR3_Ex0qB9Q.webp", "biography": "Heather is an award-winning cybersecurity, technology, risk, and resilience leader with extensive experience across both public and private sectors. A Fellow of the Chartered Institute of Information Security and the recipient of SC Awards Europe\u2019s \u201cCISO of the Year 2024,\u201d she is widely recognised for her expertise in cybersecurity, privacy, and emerging technology risk governance.\r\n\r\nAs an independent advisor, Heather provides strategic guidance to organisations globally, helping them navigate the complex intersection of cybersecurity, AI governance, privacy, and resilience, ensuring secure, responsible innovation. Previously, Heather served as the first Chief Information Security Officer at The University of Manchester and played a key role in Scotland\u2019s public sector, leading cybersecurity efforts for the country\u2019s first digital-first Census. In addition to leading in-house security teams, she has acted as a trusted advisor to boards and executive leadership teams.\r\n\r\nHeather currently serves on the Privacy and Security Advisory Board for Flo Health Inc (the most downloaded women\u2019s health app globally, with over 70 million monthly active users), the UK Advisory Council for ISC2, and the Advisory Council for Infosecurity Europe.", "public_name": "Heather Lowrie", "guid": "8be59b57-8394-51a1-b583-7b728d875297", "url": "https://pretalx.com/bsides-exeter-2025/speaker/7HVDR3/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/7QKCSC/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/7QKCSC/", "attachments": []}, {"guid": "dfd5e305-d4f8-5f0b-b53c-0b7a59d1f751", "code": "UAWWPS", "id": 62937, "logo": null, "date": "2025-04-26T09:45:00+00:00", "start": "09:45", "duration": "00:40", "room": "Auditorium", "slug": "bsides-exeter-2025-62937-aftermath-the-human-cost-of-ransomware", "url": "https://pretalx.com/bsides-exeter-2025/talk/UAWWPS/", "title": "Aftermath: The human cost of ransomware", "subtitle": "", "track": "Blue", "type": "Talk", "language": "en", "abstract": "Join a seasoned SecOps lead as they dig beyond the financial & reputational impacts of cyber incidents and explore the often overlooked emotional toll, cultural shifts, and stresses that happen when they hit.\r\n\r\nDiscover the far-reaching consequences, from sleepless nights and anxiety to organisational trauma, and go home with practical strategies to build resilience and protect your people before, during, and after attacks.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "XVJM3L", "name": "Adrian Taylor", "avatar": "https://pretalx.com/media/avatars/XVJM3L_JcmPFSN.webp", "biography": "Based in Bristol, Adrian has been working in the blue team and services world for 20 yrs, and is currently a Snr Director at Unit 42.\r\n\r\nHe\u2019s designed, built, worked in and sold SOCs across the globe and his talks tend to be a bit of a lighthearted romp through the world of modern SecOps and how to get ahead in this fast paced world. He\u2019s passionate about neurodiversity in cyber, and has a unique way of exploring psychology and the human side of cyber.", "public_name": "Adrian Taylor", "guid": "c0493c9d-71da-50e5-bc2f-597e01ec7243", "url": "https://pretalx.com/bsides-exeter-2025/speaker/XVJM3L/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/UAWWPS/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/UAWWPS/", "attachments": []}, {"guid": "28174655-bd38-5b7b-b09a-e7c77bfc7e75", "code": "8Y8MPQ", "id": 62327, "logo": "https://pretalx.com/media/bsides-exeter-2025/submissions/8Y8MPQ/Prompt-ing_The_In_5A9dt6q.png", "date": "2025-04-26T10:30:00+00:00", "start": "10:30", "duration": "00:20", "room": "Auditorium", "slug": "bsides-exeter-2025-62327-prompt-ing-the-injection-llms-under-attack", "url": "https://pretalx.com/bsides-exeter-2025/talk/8Y8MPQ/", "title": "Prompt-ing the Injection - LLMs Under Attack!", "subtitle": "", "track": "Purple", "type": "Rookie Talk", "language": "en", "abstract": "This talk provides a brief overview about how Large Language Models (LLMs) work, with a detailed explanation & live demonstration about how you can gather sensitive information from LLMs. This simulates how an attacker could gain information from new and emerging technologies.", "description": "This talk begins by explaining the fundamental workings of LLMs, detailing how these models generate responses based upon the prompts they recieve. With this understanding, the session shifts focus towards specific vulns that arise when threat actors manipulate inputs to influence the models outputs.\r\n\r\nThrough live demonstrations, attendees will seek how attackers can exploit these vulnerabilities, simulating real world scenarios where prompt injection is used to cause unintended behaviour or access confidential data. The talk will emphasise the importance of recognising these threats as LLMs become more integrated into applications across industries. This talk will finish with a summary of the elements, and how organisations could defend against these.", "recording_license": "", "do_not_record": false, "persons": [{"code": "JW8SRP", "name": "Smitha Bhabal", "avatar": "https://pretalx.com/media/avatars/JW8SRP_HzyphcB.webp", "biography": null, "public_name": "Smitha Bhabal", "guid": "dcfd0567-de40-54a4-98f4-f66988383fe3", "url": "https://pretalx.com/bsides-exeter-2025/speaker/JW8SRP/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/8Y8MPQ/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/8Y8MPQ/", "attachments": []}, {"guid": "d2973053-2382-525b-8a9a-fb1569d701b2", "code": "AHBT98", "id": 64551, "logo": null, "date": "2025-04-26T10:50:00+00:00", "start": "10:50", "duration": "00:20", "room": "Auditorium", "slug": "bsides-exeter-2025-64551-security-mismatch-organisational-users-have-different-it-expectations-from-system-administrators-using-organisational-culture-to-close-the-gap", "url": "https://pretalx.com/bsides-exeter-2025/talk/AHBT98/", "title": "Security mismatch. Organisational users have different IT expectations from system administrators. Using organisational culture to close the gap", "subtitle": "", "track": "Blue", "type": "Rookie Talk", "language": "en", "abstract": "This paper will look at reasons why organisations use approved software lists, and why users (with little real understanding of security) find such lists increasingly frustrating, once they have found that they can do the job quicker and more effectively using their own apps.\r\nIt also examines the role of BYOD in expanding this headache for managers of organisational systems, and how best practice of a hybrid approach to BYOD/organisation systems that embraces security issues can in turn reduce the more general problem of \"Shadow IT\".\r\nThe follow on from this would be an academic paper examining the relationship between type of organisation culture and extent of Shadow IT.", "description": "Computer users get more sophisticated in their use of applications every day. Organisations typically have one application type for each job function, and double-down on security for those applications and the platforms that support them. Users see their application use as quicker and more efficient than the official way, and take short-cuts, often breaking policy to do so. This has been happening for many years, and as apps get more sophisticated, the gulf between end-users and system administrators gets wider. What can be done to close the gap? The role of organisational culture is examined, and conclusions tentatively drawn. Academic research that followed based on types of organisational culture and extent of mismatch. All organisations would participate anonymously.", "recording_license": "", "do_not_record": false, "persons": [{"code": "MLWEEC", "name": "Richard Henson", "avatar": null, "biography": null, "public_name": "Richard Henson", "guid": "f3ae58f4-db65-59af-8d5e-d476b7aea1a2", "url": "https://pretalx.com/bsides-exeter-2025/speaker/MLWEEC/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/AHBT98/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/AHBT98/", "attachments": []}, {"guid": "d74a766f-9a5d-5ad1-9d69-6ddd86b8b7e8", "code": "D7MRHZ", "id": 65200, "logo": null, "date": "2025-04-26T11:10:00+00:00", "start": "11:10", "duration": "00:20", "room": "Auditorium", "slug": "bsides-exeter-2025-65200-the-art-of-threat-modelling", "url": "https://pretalx.com/bsides-exeter-2025/talk/D7MRHZ/", "title": "The Art of Threat Modelling", "subtitle": "", "track": "Blue", "type": "Rookie Talk", "language": "en", "abstract": "The 'Art of Threat Modelling' covers a high level overview of the what, why, how of threat modelling and how we all  can threat model pretty much..... anything", "description": "Threat Modelling isn't boring!\r\n\r\nThis talk is aims to show you this in a fun, fast paced and engaging way looking at:\r\n\r\n* The fundamentals of threat modelling\r\n* How you can Threat Model anything \r\n* The use of your operational data, such as threat intel or post incident reviews, to help better shape your outputs\r\n\r\nEnjoy", "recording_license": "", "do_not_record": false, "persons": [{"code": "EJCA9W", "name": "Deleted User", "avatar": null, "biography": "Paul's current focus is driving and leading threat modelling methodologies and secure by design strategies within business.\r\n\r\nA highly motivated, qualified, and experienced Security Consultant and Military Veteran with over 22 years within Information Technology industry.\r\n\r\nPaul lives in the heart of Eryri (formally Snowdonia) National Park in Wales UK and he is often found around the mountains. \r\n\r\nOutside of work, he is average ultra runner and the co-host of the CAPB podcast.", "public_name": "Deleted User", "guid": "f9713a92-ec61-5219-aa11-bdd6119b1c6f", "url": "https://pretalx.com/bsides-exeter-2025/speaker/EJCA9W/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/D7MRHZ/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/D7MRHZ/", "attachments": []}, {"guid": "8c635d65-15de-59a6-bef8-fc37978d033f", "code": "LAXSZ9", "id": 69107, "logo": null, "date": "2025-04-26T11:40:00+00:00", "start": "11:40", "duration": "00:40", "room": "Auditorium", "slug": "bsides-exeter-2025-69107-how-to-hack-yourself", "url": "https://pretalx.com/bsides-exeter-2025/talk/LAXSZ9/", "title": "How to Hack Yourself", "subtitle": "", "track": "Purple", "type": "Talk", "language": "en", "abstract": "In this talk we'll dive into the world of Open Source Intelligence (OSINT), exploring how public information from online sources can be used to uncover personal (and sometimes private) details about yourself. You'll learn what a digital footprint is, how every action online contributes to your digital identity, and the potential risks associated with using social media. Most importantly, we\u2019ll also go through actionable steps to help you safeguard your privacy and protect yourself from potential online threats. Whether you\u2019re a beginner or want to deepen your understanding about your digital footprint, this session will help equipped you with the tools to stay safe in today\u2019s social media driven world.", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"code": "YRCMML", "name": "Stuart Baker", "avatar": null, "biography": "Sophia McCall is a CREST Certified Threat Intelligence Manager and works as a Strategic Threat Intelligence Lead in the cyber security industry. Passionate about encouraging diversity in industry; Sophia is also a founding member of Security Queens, a brand created to promote inclusion and diversity in cyber security, and is a chapter administrator for the Ladies of Cheltenham Hacking Society. Sophia has also previously captained Team UK at the European Cyber Security Challenge, an international ethical hacking competition, and is also a Cyber Hunter on Channel 4's Hunted. With an additional interest in intelligent transport systems and automotive security; her awards from industry include \u201cBest Newcomer to Security\u201d, \u201cMost Educational Blog for User Awareness\", a named \"Top Female Cybersecurity Leader\" and was previously a winner of the \u201cMost Inspiring Women in Cyber\u201d award.", "public_name": "Stuart Baker", "guid": "5c97c55a-8b3c-52fb-9909-db60a9834d37", "url": "https://pretalx.com/bsides-exeter-2025/speaker/YRCMML/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/LAXSZ9/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/LAXSZ9/", "attachments": []}, {"guid": "3a68784d-f71a-5e99-a51d-37db8ec5f715", "code": "SRMVWC", "id": 64805, "logo": null, "date": "2025-04-26T12:20:00+00:00", "start": "12:20", "duration": "00:40", "room": "Auditorium", "slug": "bsides-exeter-2025-64805-battle-tested-incident-recovery-lessons-from-the-front-lines", "url": "https://pretalx.com/bsides-exeter-2025/talk/SRMVWC/", "title": "Battle-Tested Incident Recovery: Lessons from the Front Lines", "subtitle": "", "track": "Purple", "type": "Talk", "language": "en", "abstract": "Jack Hughes a leader of the Unit 42 Digital Forensics and Incident Response team will provide insight into the often-overlooked world of incident recovery. This talk draws on real-world experience and lessons from the front line of cybersecurity. Jack will discuss commonly observed mistakes that derail containment and recovery efforts based on the experience of leading hundreds of incidents globally. \r\n\r\nThe session will walk through case studies, lessons learnt the hard way and methodologies for incident recovery that reduce the current and future risk of incident recurrence.  \r\n\r\nWhether you're a seasoned incident responder or new to the field, this session will equip you with the insights and practical guidance to transform your approach to incident recovery.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "YD8XWG", "name": "Jack Hughes", "avatar": "https://pretalx.com/media/avatars/YD8XWG_GxIsvP8.webp", "biography": "Bringing over a decade of experience leading world-class incident response teams, I've had a front-row seat to the ever-evolving landscape of cyber threats. My passion lies in transforming that experience into actionable strategies that empower organisations to not only withstand attacks but emerge stronger.\r\n\r\nMy expertise spans the full spectrum of incident response, from dissecting malware to orchestrating global investigations involving forensic experts, legal teams, and crisis communication specialists. I thrive on building and leading high-performing teams, fostering a collaborative environment where technical excellence meets strategic thinking.", "public_name": "Jack Hughes", "guid": "4b101e9e-0f00-59fe-bf8f-f7a98b28691f", "url": "https://pretalx.com/bsides-exeter-2025/speaker/YD8XWG/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/SRMVWC/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/SRMVWC/", "attachments": []}, {"guid": "f55d3de9-4c26-58d7-9665-4f32bf88f636", "code": "33CQKT", "id": 64865, "logo": null, "date": "2025-04-26T14:00:00+00:00", "start": "14:00", "duration": "00:40", "room": "Auditorium", "slug": "bsides-exeter-2025-64865-hacktivists-v2-0", "url": "https://pretalx.com/bsides-exeter-2025/talk/33CQKT/", "title": "Hacktivists V2.0", "subtitle": "", "track": "Purple", "type": "Keynote", "language": "en", "abstract": "We as an industry have been heavily focused on the ransomware threat. A loud and dramatic threat that commands the attention of security professionals, governments and CEO\u2019s globally but has possibly diverted some of our resources away from another increasingly concerning threat.\r\nHacktivists seem like an old adversary that are the concern only of big banks and extractive industry organisations. This is a dangerous assessment. In this talk we will look at the rapid increase in their number, capability and motivation. Who are they? How do they select targets? How are they funded? Why do they pose a threat to you? What discussions do we need to have in 2025 to combat them?", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "DJ3888", "name": "lisa forte", "avatar": null, "biography": "Partner at Red Goat Cyber Security", "public_name": "lisa forte", "guid": "e39daaab-7f93-5de2-9896-c57446f448a7", "url": "https://pretalx.com/bsides-exeter-2025/speaker/DJ3888/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/33CQKT/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/33CQKT/", "attachments": []}, {"guid": "fde0898c-e091-5a74-bce1-1250fa8124e4", "code": "FRL7UC", "id": 65995, "logo": null, "date": "2025-04-26T14:45:00+00:00", "start": "14:45", "duration": "00:40", "room": "Auditorium", "slug": "bsides-exeter-2025-65995-grand-social-engineering-devsecops-and-influence", "url": "https://pretalx.com/bsides-exeter-2025/talk/FRL7UC/", "title": "Grand Social Engineering - DevSecOps and Influence", "subtitle": "", "track": "Purple", "type": "Talk", "language": "en", "abstract": "Successful DevSecOps transformation is much more then putting tools in pipelines and declaring \"shift left\". The hardest shift to pull off is when it comes to nudging values towards digital safety, and in this talk I walkthrough the techniques and literature I use to do this at scale. We will cover theories from Organisational Change Management, Leadership and Influence, and how we can apply these social tools in the context of DevSecOps to help you make an impact.", "description": "DevSecOps is more than just technology\u2014it\u2019s a fundamental shift in mindset, culture, and collaboration. While many organizations focus on tools and automation, the real challenge lies in leading people through this transformation. This talk will explore the psychological and organizational change management techniques essential for driving a successful DevSecOps journey.  \r\n\r\nWe\u2019ll begin by examining a change model like Kotter\u2019s 8-Step Change Model, a structured approach to transformation that helps organizations create urgency, build coalitions, and embed lasting change. Understanding these steps enables leaders to navigate resistance and foster buy-in at all levels. We will also look psychological safety, a critical factor in high-performing teams. Using David Rock\u2019s SCARF Model we\u2019ll explore how to create environments where developers, security, and operations teams can collaborate without fear. Psychological safety is the foundation for open discussions, continuous learning, and innovation in security practices. Finally, Influence and communication play a crucial role in transformation. We\u2019ll discuss key techniques such as mirroring and active listening, which enhance trust and alignment. Understanding the principles of negotiation and persuasion allows leaders and change agents to align stakeholders, overcome objections, and drive meaningful action. I will talk through my own experiences applying these models in the context of DevSecOps.\r\n\r\nWhether you are a leader, engineer, or security professional, this talk will equip you with the tools to influence change, foster collaboration, and make an impact.", "recording_license": "", "do_not_record": false, "persons": [{"code": "9DU7FA", "name": "Seb Coles", "avatar": "https://pretalx.com/media/avatars/9DU7FA_jPQQOWt.webp", "biography": "Seb is an experienced information and security professional who specialises in DevSecOps transformation. He considers himself an Engineer first, but quickly realised in the world of DevSecOps that the skills needed to make an impact at scale were found in psychology and business, and now regularly speaks on topics of Leadership and Organisation Change. \r\n\r\nSeb has previously held roles such as Senior Consultant @ Veracode, Senior Manager @ ClearBank, Head of DevOps @ LRQA and is now IT Infrastructure and Security Manager @ Seccl helping build a secure world class trading platform.", "public_name": "Seb Coles", "guid": "1780060b-ab5f-58a3-8bff-2878b55bd876", "url": "https://pretalx.com/bsides-exeter-2025/speaker/9DU7FA/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/FRL7UC/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/FRL7UC/", "attachments": []}, {"guid": "18f7078e-ba7d-51cb-a8b5-2c74a0c81eae", "code": "YVFNNG", "id": 65953, "logo": "https://pretalx.com/media/bsides-exeter-2025/submissions/YVFNNG/hired_CSFtN6D.PNG", "date": "2025-04-26T15:30:00+00:00", "start": "15:30", "duration": "00:40", "room": "Auditorium", "slug": "bsides-exeter-2025-65953-hacking-the-job-market-double-your-chances-of-landing-an-ethical-hacker-role", "url": "https://pretalx.com/bsides-exeter-2025/talk/YVFNNG/", "title": "Hacking the Job Market: Double Your Chances of Landing an Ethical Hacker Role", "subtitle": "", "track": "Purple", "type": "Talk", "language": "en", "abstract": "Cybersecurity is one of the fastest growing industries, and with that growth comes competition. You\u2019re not only competing with other graduates from your university, but you\u2019re also competing with passionate, self-driven individuals from the rest of the world who have been honing their skills inside and outside the classroom.\r\nIf you want to stand out and land your first cybersecurity job, you need more than just a degree or certification. Employers are looking for passion, initiative, commitment and adaptability, all those things that can\u2019t be taught in a classroom. \r\nAs a manager for an Application Security (AppSec) team, I have reviewed hundreds, if not thousands of applications and conducted several hundred interviews. I\u2019ve seen firsthand what makes a candidate stand out and outshine other candidates. Our recruitment is heavily focused on junior roles out of necessity, as we are located far from metropolitan areas and can\u2019t easily attract already established senior professionals. However, my insights might be useful for more senior roles and even roles outside AppSec and Cybersecurity as well, but again, my target group for this paper is junior roles in Ethical hacking.\r\n\r\nIn this talk, I\u2019ll share my real-world insights from hiring and mentoring cybersecurity professionals and show you how to differentiate yourself.\r\nI'll share what I look for in candidates, the mistakes to avoid, and hopefully share what makes someone to truly standout and be more hirable.\r\nBy the end of this talk, you\u2019ll have a clear action plan for building your skills, personal brand, and network so you can land that first job with confidence. It\u2019s a lot of hard work, but trust me, it will make a difference, not just in the short run, what you do from today, will impact the rest of your career.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "XUDKAT", "name": "Mikael Svall", "avatar": "https://pretalx.com/media/avatars/XUDKAT_T3rU5wm.webp", "biography": "Mikael is an AppSec manager at Outpost24 with over 10 years of experience leading ethical hacking teams. He combines technical expertise with a strong focus on mentoring and team development, helping his teams excel in identifying and addressing vulnerabilities.", "public_name": "Mikael Svall", "guid": "60bb2ef4-3018-59ef-9e13-ddef2a5d877a", "url": "https://pretalx.com/bsides-exeter-2025/speaker/XUDKAT/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/YVFNNG/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/YVFNNG/", "attachments": []}, {"guid": "eccacb69-dab0-5512-9bd0-1bff341a980b", "code": "7BBYE8", "id": 64801, "logo": "https://pretalx.com/media/bsides-exeter-2025/submissions/7BBYE8/lena_pic_2_JTLGxWE.PNG", "date": "2025-04-26T16:30:00+00:00", "start": "16:30", "duration": "00:40", "room": "Auditorium", "slug": "bsides-exeter-2025-64801-the-un-natural-history-of-malware", "url": "https://pretalx.com/bsides-exeter-2025/talk/7BBYE8/", "title": "The (Un)Natural History of Malware", "subtitle": "", "track": "Purple", "type": "Keynote", "language": "en", "abstract": "Malware is constantly evolving, much like biological viruses that adapt over time in response to our defenses. I like to analyze malware as if it were a living entity, driven by the ultimate goal of survival. Just as Evolutionary Game Theory (EGT) is used to study biological evolution, what if we applied it to malware evolution as well?\r\n\r\nIn this talk, I\u2019ll explore how EGT can help us understand why malware behaves the way it does and how different strategies shape its evolution. From one-shot viral outbreaks like the ILOVEYOU worm, to stealthy shape-shifters like Simile, adaptive threats like Emotet, and symbiotic threats like CrackedCantil, we\u2019ll examine how attackers develop survival tactics\u2014some aggressive, some deceptive, and some even collaborative.\r\n\r\nAnd just like in nature, where species must adapt or go extinct, I\u2019ll discuss how defenders can use EGT principles and lessons from nature to anticipate future malware threats and build stronger defenses.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "8LVRPW", "name": "Lena Yu", "avatar": "https://pretalx.com/media/avatars/8LVRPW_dGlzoIw.webp", "biography": "Lena Yu, also known as LambdaMamba, is the founder and Chief Researcher of World Cyber Health and Malware Village. She also launched the Malware Monsters project (Malmons). Lena has presented at CARO, Virus Bulletin, BSides Vancouver, and other conferences. Additionally, she has hosted Malware Village and organized contests at DEF CON, HITCON, BSides London, and more.\r\n\r\nBefore transitioning to malware analysis, Lena worked as a low-level developer specializing in computer architecture and RISC-V Trusted Execution Environment (TEE) research.", "public_name": "Lena Yu", "guid": "4e246c84-ac30-5011-b4a1-df937fc45ac7", "url": "https://pretalx.com/bsides-exeter-2025/speaker/8LVRPW/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/7BBYE8/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/7BBYE8/", "attachments": []}], "Seminar Room 1": [{"guid": "0c821b27-8af4-539c-9009-a9c5e37b859c", "code": "SD3YF8", "id": 62665, "logo": "https://pretalx.com/media/bsides-exeter-2025/submissions/SD3YF8/Chartership-600x4_aIg3ujd.png", "date": "2025-04-26T09:45:00+00:00", "start": "09:45", "duration": "00:40", "room": "Seminar Room 1", "slug": "bsides-exeter-2025-62665-why-should-professionalism-matter-to-you", "url": "https://pretalx.com/bsides-exeter-2025/talk/SD3YF8/", "title": "Why should professionalism matter to you?", "subtitle": "", "track": "Purple", "type": "Talk", "language": "en", "abstract": "You have probably heard of the move to professionalise the cyber security industry, but why should you care? Whether your focus is on red teaming, pen testing, vulnerability scanning or threat intelligence, you need to understand the shift in the industry that will, at some point in your career, have a fundamental effect on the way that you record achievement, demonstrate competence and define your experience. I'll talk you through the changes and how to align your career pathway with them.", "description": "I will provide a detailed synopsis of the move to professional registration that has been instigated by the UK Cyber Security Council, backed by central Government and funded by DSIT. There is still confusion in the technical security community about why a Professional Title matters, so I will explain the direction and the effect this is going to have on job searches in the near future. I will also talk about CPD, ethics and standards, and giving back to the industry, and how this should be recorded if you are an offensive consultant - what counts, what doesn't, and what YOU think should count. I'll ask attendees to give me their opinions about this and the move towards professionalisation as a whole. I'll open the floor to questions so we can discuss whether you think this is a good idea, how much you're willing to invest on your individual career path, and how to progress from Associate to Chartered status as your career progresses.", "recording_license": "", "do_not_record": false, "persons": [{"code": "VQUJGV", "name": "Debi McCormack", "avatar": "https://pretalx.com/media/avatars/VQUJGV_5Gc3Wnd.webp", "biography": "Debi heads up communications and early career development at The Cyber Scheme, an NCSC Assured examination and training company assessing competency of technical cyber security professionals at all levels, through rigorous training and mentoring courses and industry-leading technical assessments. The Cyber Scheme are also a Licensed Body for the UK Cyber Security Council, able to assess and recommend individuals for a Professional Title in Security Testing, Incident Response and non-specific Associate titles. Debi's focus is on supporting entry level talent to enter technical cyber security, raising awareness of professional registration and the importance of CPD. She also runs an innovative Sponsorship programme with the technical cyber industry where individuals can donate time and expertise, receive advance warning of legislative and industry changes from Government and other industry bodies, and liaise with like-minded professionals. Debi is a regular speaker and is passionate about encouraging women into careers in technical cyber.", "public_name": "Debi McCormack", "guid": "1a9d3e07-29dd-584c-bfa8-34f78b9df2f6", "url": "https://pretalx.com/bsides-exeter-2025/speaker/VQUJGV/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/SD3YF8/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/SD3YF8/", "attachments": []}, {"guid": "c314cdf8-4c8c-575d-bdae-f40bc21553de", "code": "NRP3EG", "id": 65977, "logo": null, "date": "2025-04-26T10:30:00+00:00", "start": "10:30", "duration": "00:20", "room": "Seminar Room 1", "slug": "bsides-exeter-2025-65977-hodl-your-keys-how-seed-phrases-get-stolen", "url": "https://pretalx.com/bsides-exeter-2025/talk/NRP3EG/", "title": "HODL Your Keys: How Seed Phrases Get Stolen", "subtitle": "", "track": "Purple", "type": "Rookie Talk", "language": "en", "abstract": "In today\u2019s world cryptocurrency is becoming an area of interest for just about anybody. We constantly hear about it in the headlines, the thousands to billions being stolen, made or gone missing. In most cases, the seed phrase is the master key to all of this news. But how secure is it, really? From phishing scams and malware to sophisticated supply chain attacks, hackers, insiders and that shy teenager in their mom\u2019s basement, are constantly evolving their tactics to hijack seed phrases and drain wallets.", "description": "In this talk, we will break down how crypto wallets work, how seed phrases are generated, and the most common ways they get compromised. More importantly, we'll arm you with best practices to keep your crypto safe. Whether you're a seasoned trader or just starting out, this session will help you fortify your defenses in the ever-evolving landscape of digital finance.", "recording_license": "", "do_not_record": false, "persons": [{"code": "CTEGAP", "name": "Mykhailo Shtepa", "avatar": "https://pretalx.com/media/avatars/CTEGAP_4jswgrM.webp", "biography": "A seasoned cyber security analyst with a burning passion for anything and everything related to tech, innovation and the metaverse.", "public_name": "Mykhailo Shtepa", "guid": "7f1612ae-bbf4-5fb7-af1c-cecda011e05e", "url": "https://pretalx.com/bsides-exeter-2025/speaker/CTEGAP/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/NRP3EG/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/NRP3EG/", "attachments": []}, {"guid": "93fb44ba-1d14-535e-b35f-328ed0d03326", "code": "VJACQJ", "id": 64797, "logo": null, "date": "2025-04-26T10:50:00+00:00", "start": "10:50", "duration": "00:20", "room": "Seminar Room 1", "slug": "bsides-exeter-2025-64797-one-flew-over-the-auditors-nest-dodging-the-pitfalls-of-compliance", "url": "https://pretalx.com/bsides-exeter-2025/talk/VJACQJ/", "title": "One Flew Over the Auditors Nest (Dodging the Pitfalls of Compliance)", "subtitle": "", "track": "Blue", "type": "Rookie Talk", "language": "en", "abstract": "In the dark shadowy depths of auditing, you can see a plethora of nonconformities lurking - relentless, chaotic and recurring. Time and time again, these common pitfalls can catch companies off guard, undermining their Information Security Management System (ISMS). Whether you're an auditor, implementer or just a curious soul looking to unravel the mysteries of an ISMS, we'll take a look at the top five nonconformities (personally rated by me) and more importantly, the best mitigations and methods you can employ to prevent these devious traps from recurring!", "description": "An Information Security Management System (ISMS) is the backbone of an organisation's approach to tackling information security. The most widely known ISMS framework, lauded through the Halls of Compliance, is ISO27001. You've probably heard of it! \r\n\r\nThe ISMS is there to provide a structured approach in protecting organisational and client data in a way that is best suited to the business needs. Some businesses may have an ISMS to generally improve their information security, others may try to implement one for tendering purposes. Though many understand generally what is required, many misinterpret, overlook or outright miss areas that could result in the very foundations of the ISMS crumbling and cracking.\r\n\r\n\"But what are these areas that are so often missed?\" I hear you cry. An excellent question!\r\n\r\nIn this talk, I will uncover the five most common nonconformities and how to effectively remediate them that I've encountered during my 4 year tenure as an ISO27001 Lead Auditor. Though the talk will primarily be focused on ISO27001, the knowledge gained can still be applied to any ISMS, regardless of the framework. \r\n\r\nSo come along so you can learn from these experiences and help improve your own ISMS or - if you're an auditor or implementer - further improve your knowledge!", "recording_license": "", "do_not_record": false, "persons": [{"code": "SSMU7Q", "name": "Chris", "avatar": null, "biography": null, "public_name": "Chris", "guid": "5cacd385-5a18-55aa-be57-11afa18bf69d", "url": "https://pretalx.com/bsides-exeter-2025/speaker/SSMU7Q/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/VJACQJ/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/VJACQJ/", "attachments": []}, {"guid": "ec3fc640-6210-58fa-b098-e753bd4acc2a", "code": "W9CQR7", "id": 65884, "logo": null, "date": "2025-04-26T11:10:00+00:00", "start": "11:10", "duration": "00:20", "room": "Seminar Room 1", "slug": "bsides-exeter-2025-65884-black-belt-security-lessons-from-karate", "url": "https://pretalx.com/bsides-exeter-2025/talk/W9CQR7/", "title": "Black Belt Security - Lessons From Karate", "subtitle": "", "track": "Red", "type": "Rookie Talk", "language": "en", "abstract": "Karate is a martial art focused primarily on improving self-defence, recognising different types of attacks and being prepared to react to them in an efficient way. Sound familiar? Its enduring legacy offers us many lessons that we can bring into our workplaces to strengthen our security. Also, Cobra Kai has made it cool all over again, so tie on a patterned headband, grab a bonsai tree, and join me to explore how karate can help us improve security. Please note that no previous experience is necessary, and no audience members will be \"volunteered\" for demonstrations.", "description": "The presentation will start with an introduction and explanation of why I'm talking on this topic. I will explain that as a Nidan (second dan) black belt in karate working in cybersecurity, I'm in a position to draw lessons between the two. It will then say what it will not be: a karate class, Cobra Kai, or a history lesson.\r\n\r\nThe main part of the presentation will consider the three main aspects of karate, kihon (basics), kata (set patterns of moves), and kumite (sparring). It will explain what each of these areas are, what they require from the practitioner, and how they apply to cybersecurity. This will be backed up with anecdotes and examples that I've gathered during my time learning karate.\r\n\r\nAfter the three main areas, the presentation will cover the \"black belt level\" of tips, the lessons that might not be obvious to a beginner but become clearer as they progress through the grades.\r\n\r\nThe presentation will take a light-hearted approach, avoiding technical descriptions or confusing jargon. No previous experience or knowledge of karate will be required.", "recording_license": "", "do_not_record": false, "persons": [{"code": "RBNF9Q", "name": "Rudi van der Heide", "avatar": null, "biography": "Something about me", "public_name": "Rudi van der Heide", "guid": "c630f1a5-a4c5-5e05-8432-7106bd706999", "url": "https://pretalx.com/bsides-exeter-2025/speaker/RBNF9Q/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/W9CQR7/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/W9CQR7/", "attachments": []}, {"guid": "82386680-a222-5837-aaf0-848a62b61fd0", "code": "ZJ8PKK", "id": 66197, "logo": "https://pretalx.com/media/bsides-exeter-2025/submissions/ZJ8PKK/SWRCCU_Logo_JPG_aL6ZQun.jpg", "date": "2025-04-26T11:40:00+00:00", "start": "11:40", "duration": "00:40", "room": "Seminar Room 1", "slug": "bsides-exeter-2025-66197-ctrl-panic-alt-response-plans-del-the-drama-best-practices-for-incident-response", "url": "https://pretalx.com/bsides-exeter-2025/talk/ZJ8PKK/", "title": "Ctrl panic + Alt response plans + Del the drama: Best practices for incident response", "subtitle": "", "track": "Blue", "type": "Talk", "language": "en", "abstract": "Cyber incidents can affect organisations of any size or sector, at any time, so it\u2019s crucial that you have a plan in place to ensure you can respond, recover and continue operating. This session will highlight some of the current best practices in incident response based on cyber crime investigations here in the South West as well as nationally recognised guidance.", "description": "Over 50% of organisations in the UK experienced a cyber breach or attack in the last 12 months, yet only 22% have a formalised incident response plan (DSIT Cyber Breaches survey). With organisations now relying on digital systems to operate, it\u2019s important to consider what you do when things go wrong. Who do you contact? Who is responsible for what?  Should technical teams just switch everything off? Do we send all our staff to the pub whilst we figure this out? These are just some of the questions that businesses should consider when building their incident response plans and the technical response to an incident. \r\nThe session will signpost attendees to a number of free incident response resources, and we will cover what you can expect from a law enforcement response to cyber attacks.", "recording_license": "", "do_not_record": false, "persons": [{"code": "VURBML", "name": "South West Regional Economic and Cyber Crime Unit (SWRECCU)", "avatar": "https://pretalx.com/media/avatars/VURBML_U0gd9pV.webp", "biography": "The SWRCCU investigate cyber dependent crimes affecting South West organisations. \r\nWe have dedicated Cyber Protect Officers who provide free and impartial cyber security guidance, workshops and resources to organisations of all sizes and sectors. This is a service offered both by ourselves and your local force\u2019s cyber crime unit.\r\nOur advice is based on the very latest threat intelligence from the National Cyber Security Centre (NCSC) as well as our own investigations. You can read more about how we work with the NCSC on their website.", "public_name": "South West Regional Economic and Cyber Crime Unit (SWRECCU)", "guid": "66031585-1956-5aae-a382-6d3aa40ab8fc", "url": "https://pretalx.com/bsides-exeter-2025/speaker/VURBML/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/ZJ8PKK/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/ZJ8PKK/", "attachments": []}, {"guid": "2501ed5f-57c8-5cdb-a229-2d0e1b6670ff", "code": "KVVXM3", "id": 65971, "logo": null, "date": "2025-04-26T12:20:00+00:00", "start": "12:20", "duration": "00:40", "room": "Seminar Room 1", "slug": "bsides-exeter-2025-65971-the-uncomfortable-war-keeping-kids-safe", "url": "https://pretalx.com/bsides-exeter-2025/talk/KVVXM3/", "title": "The Uncomfortable War: Keeping Kids Safe.", "subtitle": "", "track": "Blue", "type": "Talk", "language": "en", "abstract": "Should a three-year-old have their own phone?\r\n\r\nChildren face numerous dangers online, from cyberbullying and predatory behaviours to data privacy risks. This talk explores the key challenges kids encounter on the internet and the evolving threats they face. We'll discuss the importance of building awareness among parents, educators, and IT professionals, and look into strategies to protect children in a connected world.", "description": "As children become more immersed in the online world, they face unprecedented risks that many parents, educators, and even security professionals struggle to keep up with. From cyberbullying and online predators to exposure to inappropriate content and data privacy concerns, protecting kids online is becoming increasingly challenging. In this discussion, we will explore the most pressing dangers children face today, and provide practical, actionable steps that adults can take to safeguard young users. We'll cover tools, techniques, and strategies (and maybe even make a few of our own!) to help create a safer online experience for the next generation of potential security leaders...maybe.", "recording_license": "", "do_not_record": false, "persons": [{"code": "DY7BGH", "name": "Joe wells", "avatar": "https://pretalx.com/media/avatars/DY7BGH_uGFV2tA.webp", "biography": "A final-year cybersecurity who has been researching Child Online Safety and how we all learn this cybersecurity stuff for the past 2 years.\r\n\r\nI'm a passionate person who likes to support others and help remind them of what's possible when you don't give up.", "public_name": "Joe wells", "guid": "1d2c4614-af60-5a54-940b-09c541bb5e1f", "url": "https://pretalx.com/bsides-exeter-2025/speaker/DY7BGH/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/KVVXM3/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/KVVXM3/", "attachments": []}, {"guid": "739ea24d-ec13-5a95-ab5c-36a9cdd449b0", "code": "CDBWSY", "id": 65269, "logo": "https://pretalx.com/media/bsides-exeter-2025/submissions/CDBWSY/Dog_with_sunnies_qJWni6i.jpg", "date": "2025-04-26T14:45:00+00:00", "start": "14:45", "duration": "00:40", "room": "Seminar Room 1", "slug": "bsides-exeter-2025-65269-super-pets-the-hero-you-didn-t-know-you-had-in-your-house", "url": "https://pretalx.com/bsides-exeter-2025/talk/CDBWSY/", "title": "Super Pets - The Hero you didn't know you had in your house!", "subtitle": "", "track": "Blue", "type": "Talk", "language": "en", "abstract": "We tend not to pay too much attention to things which are so familiar that we don't always see their true potential or value... like the faithful dog that guards the house or goes to get help if their owner is injured.\r\n\r\nThe good news is that something is already in every corporate and home environment, but do we leverage it to enhance our security posture... not very often, instead favouring the new shiny tools or latest marketing must have, but yet we still see breaches, ransomware and scams... whether you know it or not we all have a super pet or hero dog in our houses and it can help!", "description": "This session will dive into traffic distribution systems, how they work and how they are leveraged by criminal groups.  Most importantly we'll discuss how we can look to defend ourselves.", "recording_license": "", "do_not_record": false, "persons": [{"code": "RPFAXP", "name": "Gary Cox", "avatar": "https://pretalx.com/media/avatars/RPFAXP_akUO4gL.webp", "biography": "Currently leading the technical team for UK and Ireland, Gary joined Infoblox in 2010 and has held a variety of UK and International roles over the years.   Gary is a regular speaker at cyber security events of all sizes and formats and has over 25 years of IT/Security experience working across multiple verticals including finance, public sector, media and service providers. Gary is an active member of several ISC2 Chapters and held the CISSP qualification since 2016.", "public_name": "Gary Cox", "guid": "6eca70c3-df8e-5050-9d14-16a05e16e506", "url": "https://pretalx.com/bsides-exeter-2025/speaker/RPFAXP/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/CDBWSY/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/CDBWSY/", "attachments": []}, {"guid": "7ab8dd30-f5f1-5b36-bcf2-561eb73fb3d9", "code": "UHAECY", "id": 65878, "logo": null, "date": "2025-04-26T15:30:00+00:00", "start": "15:30", "duration": "00:40", "room": "Seminar Room 1", "slug": "bsides-exeter-2025-65878-buffy-vs-phishing-slaying-cyber-threats-sunnydale-style", "url": "https://pretalx.com/bsides-exeter-2025/talk/UHAECY/", "title": "Buffy vs. Phishing: Slaying Cyber Threats Sunnydale Style", "subtitle": "", "track": "Blue", "type": "Talk", "language": "en", "abstract": "Think slaying vamps is tough? Try battling ransomware. This talk flips the script, proving Buffy's not just awesome at slaying demons \u2013 she's a cybersecurity guru in disguise. We'll dissect her tactics: threat modeling, rapid response, training and awareness, security tools and techniques, and the crucial power of the Scooby Gang. Forget silver bullets, we're talking firewalls and threat intel. Learn how Buffy's intuition and experience translate to real-world cyber defense, and why even The Chosen One needs a team. Because in cybersecurity, just like in Sunnydale, you're never fighting alone.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "JFCP9Z", "name": "Andreea Mihai", "avatar": "https://pretalx.com/media/avatars/JFCP9Z_vgyV79K.webp", "biography": null, "public_name": "Andreea Mihai", "guid": "bde18898-5a3b-579b-b4d2-2fb01f417178", "url": "https://pretalx.com/bsides-exeter-2025/speaker/JFCP9Z/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/UHAECY/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/UHAECY/", "attachments": []}], "Seminar Room 7": [{"guid": "cb17eacd-b3c4-52ea-9695-0b44e9014f44", "code": "HDPXVF", "id": 62917, "logo": null, "date": "2025-04-26T09:45:00+00:00", "start": "09:45", "duration": "00:40", "room": "Seminar Room 7", "slug": "bsides-exeter-2025-62917-is-your-phone-spying-on-you-an-in-depth-analysis-of-vulnerabilities-in-cisco-voip-phones", "url": "https://pretalx.com/bsides-exeter-2025/talk/HDPXVF/", "title": "Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones", "subtitle": "", "track": "Red", "type": "Talk", "language": "en", "abstract": "Do you trust the embedded devices around you? Perhaps you shouldn't! Even industry giants make significant mistakes. In this presentation, we will analyse Cisco's VoIP phones, that can be found in offices, governmental buildings, and even the White House. These devices were found to have critical vulnerabilities, including easily exploitable flaws.\r\n\r\nFun Fact: Did you know that President Biden and Trump used these phones?\r\n\r\nAmong the vulnerabilities discovered was unauthenticated packet capture, allowing attackers to intercept and listen to any phone call made or received on the device. We'll demonstrate live how simple it is to intercept, reconstruct, and listen to a phone call.\r\n\r\nThis presentation will dive into other issues uncovered during the blackbox testing of these devices. We'll also discuss what Cisco could have done differently to prevent these vulnerabilities and provide guidance on how to avoid similar pitfalls. Additionally, we are going explore the challenges and importance of thorough blackbox testing.\r\n\r\nJoin us for a comprehensive look at the security flaws in trusted devices and learn how to protect against them.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "FUY9TP", "name": "Balazs Bucsay", "avatar": "https://pretalx.com/media/avatars/FUY9TP_dujDP7Z.webp", "biography": "Balazs Bucsay is the founder & CEO of Mantra Information Security that offers a variety of consultancy services in the field of IT Security. With decades of offensive security experience, he is focusing his time mainly on research in various fields including red teaming, reverse engineering, embedded devices, firmware emulation and cloud. He gave multiple talks around the globe (Singapore, London, Melbourne, Honolulu) on different advanced topics and released several tools and papers about the latest techniques. He has multiple certifications (OSCE, OSCP, OSWP) related to penetration testing, exploit writing and other low-level topics and degrees in Mathematics and Computer Science. Balazs thinks that sharing knowledge is one of the most important things, so he always shares it with his peers. Because of his passion for technology, he starts the second shift right after work to do some research to find new vulnerabilities.", "public_name": "Balazs Bucsay", "guid": "331b660d-8799-5e9d-8155-543ebcf14ed5", "url": "https://pretalx.com/bsides-exeter-2025/speaker/FUY9TP/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/HDPXVF/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/HDPXVF/", "attachments": []}, {"guid": "7bb23c7b-e833-5d02-a759-8061709cadaa", "code": "LQTB8N", "id": 65903, "logo": null, "date": "2025-04-26T10:30:00+00:00", "start": "10:30", "duration": "00:20", "room": "Seminar Room 7", "slug": "bsides-exeter-2025-65903-zero-to-pentester-my-root-into-cyber", "url": "https://pretalx.com/bsides-exeter-2025/talk/LQTB8N/", "title": "Zero to Pentester: My \u2018root\u2019 into Cyber", "subtitle": "", "track": "Purple", "type": "Rookie Talk", "language": "en", "abstract": "A 20-minute presentation on my journey from working in oil & gas into becoming a Senior CTL APP Pentester and all the challenges I have faced since moving into cyber 3 years ago.\r\n\r\nThis will be aimed at encouraging people to explore their soft skills, and that technical skills aren\u2019t all you need. Key points in the talk will include self-development, tips on resources to use, things I\u2019d do differently and my goals going forward. It is aimed at students/graduates/people looking to transition into cyber security.\r\n\r\nThe talk will be interactive and will contain some technical information, however this is considered a careers talk, not a technical talk.", "description": "This presentation focuses on my transition into cyber security from oil & gas, and how I transferred skills from a completely different role and industry to succeed in my current day-to-day role. There seems to be a misconception in the security space which leans on the idea that success in this industry only comes from graduating from university with a degree in cyber security.\r\n\r\nPenetration testing is a consultancy-focused role (or should be), therefore client communication is a key skill. Having the ability to effectively communicate technical information to a non-technical audience is a prime example of a skill that makes a great consultant. For example, there's a critical difference between being able to execute a complex DOM-based Cross-Site Scripting attack and the ability to explain the risk of the attack, and how it could be leveraged to contextually affect a specific system.\r\n\r\nAlthough certain technical aspects will be noted in this talk, it is more weighted towards having the correct mindset and objectives. Moving from a completely different industry into one as technical as ethical hacking can be daunting, and navigating the plethora of information available can be a task in itself. However, it\u2019s important to maintain a positive outlook and set reasonable goals, as mindset is far more powerful than prior knowledge. The old saying goes: \"Give a man a fish, and you feed him for a day. Teach a man to fish, and you feed him for a lifetime.\" The same applies to learning in cyber security.\r\n\r\nYou can either gain knowledge to overcome a single task or adopt a mindset and work ethic that allow you to tackle a hundred tasks. This goes both ways\u2014employers should recognise talented candidates based on proven work ethic and drive, demonstrated through achievements on platforms like Hack The Box, TryHackMe, TCM Security, A Cloud Guru, and YouTube, rather than overlooking them simply for not holding a cyber security degree.\r\n\r\nIn this talk, I delve into how I progressed to the level of a Senior CTL APP Pentester, providing actionable tips for industry newcomers and those looking to transition into cyber security.", "recording_license": "", "do_not_record": false, "persons": [{"code": "NGYRHE", "name": "Ross Mitchell", "avatar": "https://pretalx.com/media/avatars/NGYRHE_SBAUaxW.webp", "biography": "Ross started his career in the oil and gas industry. He joined the Cyberis Academy in 2022, and through hard work and enthusiasm rapidly gained experience and qualifications becoming a Certified Cyber Scheme Team Member (CSTM), followed by passing the Cyber Scheme Team Leader exam (CSTL \u2013 Web App). He also holds Google Cloud Platform Digital Leader and Associate Cloud Engineer (GCP-ACE) qualifications. As a senior consultant in Cyberis\u2019 technical team, Ross specialises in web applications and cloud assessments, and is an aspiring red teamer.\r\n\r\nRoss is passionate about training and developing others looking to move into the field and enjoys getting involved in presenting and promoting both the company and the cyber industry. He was shortlisted in the \u201cRising Star\u201d category at the Security Serious Unsung Heroes Awards 2023. \r\n\r\nRoss is also a keen musician who plays in a band, recently joined a rugby team in Edinburgh, and loves spending time with his little dog, Yoshi.", "public_name": "Ross Mitchell", "guid": "a058b12a-db75-5ac3-9268-6b5bca60d722", "url": "https://pretalx.com/bsides-exeter-2025/speaker/NGYRHE/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/LQTB8N/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/LQTB8N/", "attachments": []}, {"guid": "d714a5af-8ffc-5cfe-929c-67061b9b328a", "code": "FBYR9G", "id": 65997, "logo": "https://pretalx.com/media/bsides-exeter-2025/submissions/FBYR9G/sm_7GAbK7f.jpg", "date": "2025-04-26T10:50:00+00:00", "start": "10:50", "duration": "00:20", "room": "Seminar Room 7", "slug": "bsides-exeter-2025-65997-analyzing-the-impact-of-spectre-and-meltdown-vulnerabilities-on-modern-computing-systems-a-case-study", "url": "https://pretalx.com/bsides-exeter-2025/talk/FBYR9G/", "title": "Analyzing the Impact of Spectre and Meltdown Vulnerabilities on Modern Computing Systems: A Case Study", "subtitle": "", "track": "Red", "type": "Rookie Talk", "language": "en", "abstract": "This case study, explained by 2 master's students, dives into the Spectre and Meltdown vulnerabilities, which were exploited to target the CPU architecture design aimed at enhancing performance. \r\n\r\nRetrospectively, the system had failsafes in place to address this issue, but they were not deployed quickly enough, to prevent this exploit.\r\n\r\nAttackers leveraged the \"Least Recently Used\" logic to breach the hardware layer from the software layer, leading to one of the most significant threats in history.\r\n\r\nMajor companies were hesitant to release information until they had a firm solution to ensure public safety.\r\n\r\nThis talk will showcase how the attack was carried out and what countermeasures were implemented to stop this exploit from being carried out in today's world.", "description": "The Illusion of Safety Superimposed on a System Prioritizing Performance\r\n\r\nOver the years, in their pursuit of fine-tuning hardware architecture to meet our aspirations of performance and safety, designers faced a fundamental question: which one can we deliver to the public while maintaining their trust that this is a secure system?\r\n\r\nHowever, this delicate balance was shattered when a fatal flaw was discovered, affecting modern architectures in a way that wasn't fully preventable by software patches alone.", "recording_license": "", "do_not_record": false, "persons": [{"code": "VEENFC", "name": "Mohammed Mohtesham Ali", "avatar": "https://pretalx.com/media/avatars/VEENFC_nfoCJPP.webp", "biography": "Cyber Security Master's Student and President of Cyber Security Society.", "public_name": "Mohammed Mohtesham Ali", "guid": "e36f1620-4b42-59b2-9583-ade13d493633", "url": "https://pretalx.com/bsides-exeter-2025/speaker/VEENFC/"}, {"code": "HHGWLX", "name": "Abhishek Aggarwal", "avatar": null, "biography": ".", "public_name": "Abhishek Aggarwal", "guid": "2a945d68-ad67-5939-8a2f-789d9b90592e", "url": "https://pretalx.com/bsides-exeter-2025/speaker/HHGWLX/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/FBYR9G/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/FBYR9G/", "attachments": []}, {"guid": "0e6b30d7-c06f-503c-9081-381c41baeaf3", "code": "JTGJXG", "id": 65979, "logo": null, "date": "2025-04-26T11:10:00+00:00", "start": "11:10", "duration": "00:20", "room": "Seminar Room 7", "slug": "bsides-exeter-2025-65979-custom-scripts-and-tools-for-pen-testing-a-beginner-s-guide", "url": "https://pretalx.com/bsides-exeter-2025/talk/JTGJXG/", "title": "Custom Scripts and tools for pen testing: a beginner's guide", "subtitle": "", "track": "Red", "type": "Rookie Talk", "language": "en", "abstract": "A beginner-friendly session aimed at running through common pain-points within the penetration testing process and how automation and scripting can be introduced to help alleviate these issues using Python and Bash. This session explores automating web requests, managing and manipulating large datasets, and generating customer-appropriate outputs to help testers improve efficiency without advanced coding knowledge. Attendees will leave with practical techniques and examples to build custom scripts that streamline workflows and improve testing consistency.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "NDTVSD", "name": "Adam Crease", "avatar": "https://pretalx.com/media/avatars/NDTVSD_WskXSlk.webp", "biography": "Adam is an enthusiastic penetration tester with experience uncovering vulnerabilities and enhancing system security. Prior to entering the world of cybersecurity, he developed a strong technical foundation as a full-stack software engineer, creating robust applications across platforms. This mix of building and breaking systems has given Adam a unique lens through which he approaches his work, and he's eager to share insights from his ongoing journey in the field.", "public_name": "Adam Crease", "guid": "0d865a10-a0c8-5809-8d84-e78f774e7d45", "url": "https://pretalx.com/bsides-exeter-2025/speaker/NDTVSD/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/JTGJXG/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/JTGJXG/", "attachments": []}, {"guid": "72e6ebee-d2c4-5906-a52e-4161b69b43dc", "code": "KYLMU8", "id": 65996, "logo": null, "date": "2025-04-26T11:40:00+00:00", "start": "11:40", "duration": "00:40", "room": "Seminar Room 7", "slug": "bsides-exeter-2025-65996-cybersecurity-threats-and-attacks-in-modern-manufacturing", "url": "https://pretalx.com/bsides-exeter-2025/talk/KYLMU8/", "title": "Cybersecurity Threats and Attacks in Modern Manufacturing", "subtitle": "", "track": "Red", "type": "Talk", "language": "en", "abstract": "Modern manufacturing relies heavily on highly integrated IT systems. While various terms -- such as Industry 4.0, Cyber-Physical Production Systems, and the Industrial Internet of Things (IIoT) -- describe these systems, they all share a common characteristic: the fusion of enterprise software with sensors and actuators. This creates a complex IT landscape comprising devices with diverse computational capabilities, operating systems, and software versions. Additionally, many manufacturing environments must integrate legacy systems that were never designed to be connected to the internet, further complicating security efforts.\r\n\r\nBeyond the inherent challenges of securing such heterogeneous environments, cyberattacks on manufacturing systems can have severe real-world consequences, extending beyond data breaches to physical disruptions and costly damages.\r\n\r\nIn this talk, I will first provide a brief introduction to modern manufacturing systems. I will then explore key cybersecurity threats, with a particular focus on attacks targeting process logic vulnerabilities that can be exploited by both external threat actors and insiders. As far as possible, identified threats will be illustrated by real world attacks. I will conclude the talk with a brief outlook on ongoing research developing tools to detect (and mitigate) cybersecurity threats in modern manufacturing.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "LN33XD", "name": "Achim D. Brucker", "avatar": null, "biography": "Achim is a Professor in Computer Science (Chair in Cybersecurity) and   Head of the Cybersecurity Group at the University of Exeter, UK.\r\n\r\n  He has over 20 years of professional experience in cyber security in\r\n  general, and, in particular, in research and development of safety\r\n  and security critical systems. In his work, he particularly focuses\r\n  on techniques, methods, and tools for ensuring the safety, security,\r\n  correctness, and trustworthiness of advanced systems.\r\n\r\n  His industry experience includes being a Security Architect and\r\n  Security Testing Strategist for SAP SE. In this role, he defined the\r\n  risk-based security testing strategy of SAP that combines static,\r\n  dynamic, and interactive security testing methods and integrates\r\n  them deeply into SAP's Secure Software Development Life Cycle.\r\n\r\n  He is supporting security initiatives and events in the South West,\r\n  building bridges between industry, academia, and the local\r\n  community. Amongst others, he is a member of the SWCSC Steering\r\n  Committee and the BSides Exeter Steering Committee.", "public_name": "Achim D. Brucker", "guid": "0a3a539a-4c35-556c-b042-ef6e91171e4d", "url": "https://pretalx.com/bsides-exeter-2025/speaker/LN33XD/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/KYLMU8/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/KYLMU8/", "attachments": []}, {"guid": "982369bd-6371-588d-8abf-95c502c74a8a", "code": "CNHPUV", "id": 65236, "logo": null, "date": "2025-04-26T12:20:00+00:00", "start": "12:20", "duration": "00:40", "room": "Seminar Room 7", "slug": "bsides-exeter-2025-65236-the-single-packet-shovel-digging-for-desync-powered-request-tunnelling", "url": "https://pretalx.com/bsides-exeter-2025/talk/CNHPUV/", "title": "The Single-Packet Shovel: Digging For Desync-Powered Request Tunnelling", "subtitle": "", "track": "Red", "type": "Talk", "language": "en", "abstract": "Despite HTTP Request Tunnelling's resurgence in recent years with the advent of [HTTP/2 Desync Attacks](https://portswigger.net/research/http2#h2desync), its much bolder big brother HTTP Request Smuggling has stolen the limelight, leaving cases of desync-powered tunnelling buried for all but the most dedicated tunnelling enthusiasts. \r\n\r\nIn this session I will reveal the discovery of wide-spread cases of request tunnelling in applications powered by popular servers including IIS, Azure Front Door and `redacted` including the creation of a novel detection technique that combined the recently popularised \"Single-Packet Attack\" with our ever-trusty HTTP desync techniques. \r\n\r\nThroughout the presentation I will also explore the complexities of navigating security research for the first time, drawing parallels from the advice given in [so you want to be a web security researcher](https://portswigger.net/research/so-you-want-to-be-a-web-security-researcher) and illuminate the ease through which existing tooling from industry leading researchers can be adapted in order to rapidly test your own ideas even with a rudimentary understanding of programming.", "description": "", "recording_license": "", "do_not_record": false, "persons": [{"code": "QHMDMZ", "name": "Thomas Stacey", "avatar": "https://pretalx.com/media/avatars/QHMDMZ_olcdyrY.webp", "biography": "I am a penetration tester, security researcher and full-time Lego enthusiast. I have a passion for exploring and applying new (and far too complicated) attack techniques, and am constantly searching for opportunities to continue my personal development and contribute to the wider cyber security community.", "public_name": "Thomas Stacey", "guid": "0d96c3ae-e1f9-5e8c-bbd4-4a53451be70d", "url": "https://pretalx.com/bsides-exeter-2025/speaker/QHMDMZ/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/CNHPUV/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/CNHPUV/", "attachments": []}, {"guid": "978b04f3-02dd-5841-829e-79f5605ee287", "code": "D3TBA7", "id": 62326, "logo": null, "date": "2025-04-26T14:45:00+00:00", "start": "14:45", "duration": "00:40", "room": "Seminar Room 7", "slug": "bsides-exeter-2025-62326-beacon-harvest-conquering-cobalt-strike-at-scale", "url": "https://pretalx.com/bsides-exeter-2025/talk/D3TBA7/", "title": "Beacon Harvest: Conquering Cobalt Strike at Scale", "subtitle": "", "track": "Red", "type": "Talk", "language": "en", "abstract": "Cobalt Strike started as a legitimate red team tool for simulating adversarial attacks; however, its powerful capabilities have made it a frequent target for abuse by APT groups, hacktivists, and cybercriminals. This talk outlines an automated, large-scale approach to harvesting Cobalt Strike payloads from VirusTotal and de-obfuscating them to extract key Indicators of Compromise (IOCs). By analysing these beacons at scale, we transform raw malware data into actionable threat intelligence\u2014helping defenders stay one step ahead of adversaries who exploit Cobalt Strike for malicious gain.", "description": "Although Cobalt Strike was originally developed for ethical hacking and red teaming, the platform\u2019s robust features have increasingly drawn the attention of malicious actors. From state-sponsored APTs to hacktivists and cybercriminals, adversaries leverage Cobalt Strike for sophisticated and stealthy attacks. In this session, we will demonstrate our end-to-end process for:\r\n\r\n- Continuously harvesting Cobalt Strike payloads from VirusTotal\r\n- Automating the de-obfuscation of extracted samples\r\n- Identifying and extracting key IOCs, such as C2 infrastructure and configuration details\r\n\r\nWe will walk through the custom scripts and tooling that power this pipeline, sharing the challenges and lessons learned in scaling up analysis. Attendees will see how to convert vast quantities of malware data into timely, actionable intelligence to enhance detection, incident response, and overall security posture. By studying these real-world payloads, defenders can better understand how threat actors abuse Cobalt Strike and apply those insights to fortify their defences.", "recording_license": "", "do_not_record": false, "persons": [{"code": "8NDBPN", "name": "Ben (@polygonben)", "avatar": "https://pretalx.com/media/avatars/8NDBPN_ECHnXeI.webp", "biography": "Ben is massive cyber-nerd, with a passion for creative defence-evasion techniques, reverse-engineering malware and fighting adversaries! He currently works full time in a SOC for Accenture/Context Information Security. In his spare time you'll find him dissecting malware captured in his honeypots, pwning boxes and recording his solutions for his YouTube, or enjoying a pint in the pub.", "public_name": "Ben (@polygonben)", "guid": "28efe064-5a52-5b26-922c-e80f9bae9088", "url": "https://pretalx.com/bsides-exeter-2025/speaker/8NDBPN/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/D3TBA7/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/D3TBA7/", "attachments": []}, {"guid": "562cd69e-7027-5d73-bdf1-38423275f578", "code": "33YKMS", "id": 65799, "logo": null, "date": "2025-04-26T15:30:00+00:00", "start": "15:30", "duration": "00:40", "room": "Seminar Room 7", "slug": "bsides-exeter-2025-65799-paint-me-like-one-of-your-firmwares", "url": "https://pretalx.com/bsides-exeter-2025/talk/33YKMS/", "title": "Paint Me Like One of Your Firmwares", "subtitle": "", "track": "Red", "type": "Talk", "language": "en", "abstract": "For over 11 years the final two iPod nano models somehow managed to evade the best efforts of even the most tenacious hackers to subvert - something which I took personally. The first public jailbreak of an Apple device was a prize simply too enticing to ignore. In this talk I'll explain how I went from zero access to full, persistent and unobstructed control over the entire device. Join me on this tale of ancient font formats and blindly trying to leak bits out of the darkness....", "description": "", "recording_license": "", "do_not_record": true, "persons": [{"code": "THWGCC", "name": "Callum T", "avatar": null, "biography": "Callum is  a Vulnerability Research consultant at CoreTech Security Services. When not doing VR for work, he's doing it for fun, specialising in iOS and other interesting platforms.", "public_name": "Callum T", "guid": "5183c04c-f439-5ace-ac36-f9fad5cb0b21", "url": "https://pretalx.com/bsides-exeter-2025/speaker/THWGCC/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-exeter-2025/talk/33YKMS/feedback/", "origin_url": "https://pretalx.com/bsides-exeter-2025/talk/33YKMS/", "attachments": []}]}}]}}}