<?xml version='1.0' encoding='utf-8' ?>
<iCalendar xmlns:pentabarf='http://pentabarf.org' xmlns:xCal='urn:ietf:params:xml:ns:xcal'>
    <vcalendar>
        <version>2.0</version>
        <prodid>-//Pentabarf//Schedule//EN</prodid>
        <x-wr-caldesc></x-wr-caldesc>
        <x-wr-calname></x-wr-calname>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>7QKCSC@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-7QKCSC</pentabarf:event-slug>
            <pentabarf:title>Accelerating Progress: Shifting from a Reactive to Proactive Approach in Cybersecurity</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T090000</dtstart>
            <dtend>20250426T094000</dtend>
            <duration>0.04000</duration>
            <summary>Accelerating Progress: Shifting from a Reactive to Proactive Approach in Cybersecurity</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Keynote</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/7QKCSC/</url>
            <location>Auditorium</location>
            
            <attendee>Heather Lowrie</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>UAWWPS@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-UAWWPS</pentabarf:event-slug>
            <pentabarf:title>Aftermath: The human cost of ransomware</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T094500</dtstart>
            <dtend>20250426T102500</dtend>
            <duration>0.04000</duration>
            <summary>Aftermath: The human cost of ransomware</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/UAWWPS/</url>
            <location>Auditorium</location>
            
            <attendee>Adrian Taylor</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>8Y8MPQ@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-8Y8MPQ</pentabarf:event-slug>
            <pentabarf:title>Prompt-ing the Injection - LLMs Under Attack!</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T103000</dtstart>
            <dtend>20250426T105000</dtend>
            <duration>0.02000</duration>
            <summary>Prompt-ing the Injection - LLMs Under Attack!</summary>
            <description>This talk begins by explaining the fundamental workings of LLMs, detailing how these models generate responses based upon the prompts they recieve. With this understanding, the session shifts focus towards specific vulns that arise when threat actors manipulate inputs to influence the models outputs.

Through live demonstrations, attendees will seek how attackers can exploit these vulnerabilities, simulating real world scenarios where prompt injection is used to cause unintended behaviour or access confidential data. The talk will emphasise the importance of recognising these threats as LLMs become more integrated into applications across industries. This talk will finish with a summary of the elements, and how organisations could defend against these.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Rookie Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/8Y8MPQ/</url>
            <location>Auditorium</location>
            
            <attendee>Smitha Bhabal</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>AHBT98@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-AHBT98</pentabarf:event-slug>
            <pentabarf:title>Security mismatch. Organisational users have different IT expectations from system administrators. Using organisational culture to close the gap</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T105000</dtstart>
            <dtend>20250426T111000</dtend>
            <duration>0.02000</duration>
            <summary>Security mismatch. Organisational users have different IT expectations from system administrators. Using organisational culture to close the gap</summary>
            <description>Computer users get more sophisticated in their use of applications every day. Organisations typically have one application type for each job function, and double-down on security for those applications and the platforms that support them. Users see their application use as quicker and more efficient than the official way, and take short-cuts, often breaking policy to do so. This has been happening for many years, and as apps get more sophisticated, the gulf between end-users and system administrators gets wider. What can be done to close the gap? The role of organisational culture is examined, and conclusions tentatively drawn. Academic research that followed based on types of organisational culture and extent of mismatch. All organisations would participate anonymously.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Rookie Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/AHBT98/</url>
            <location>Auditorium</location>
            
            <attendee>Richard Henson</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>D7MRHZ@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-D7MRHZ</pentabarf:event-slug>
            <pentabarf:title>The Art of Threat Modelling</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T111000</dtstart>
            <dtend>20250426T113000</dtend>
            <duration>0.02000</duration>
            <summary>The Art of Threat Modelling</summary>
            <description>Threat Modelling isn&#x27;t boring!

This talk is aims to show you this in a fun, fast paced and engaging way looking at:

* The fundamentals of threat modelling
* How you can Threat Model anything 
* The use of your operational data, such as threat intel or post incident reviews, to help better shape your outputs

Enjoy</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Rookie Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/D7MRHZ/</url>
            <location>Auditorium</location>
            
            <attendee>Deleted User</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>LAXSZ9@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-LAXSZ9</pentabarf:event-slug>
            <pentabarf:title>How to Hack Yourself</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T114000</dtstart>
            <dtend>20250426T122000</dtend>
            <duration>0.04000</duration>
            <summary>How to Hack Yourself</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/LAXSZ9/</url>
            <location>Auditorium</location>
            
            <attendee>Stuart Baker</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>SRMVWC@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-SRMVWC</pentabarf:event-slug>
            <pentabarf:title>Battle-Tested Incident Recovery: Lessons from the Front Lines</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T122000</dtstart>
            <dtend>20250426T130000</dtend>
            <duration>0.04000</duration>
            <summary>Battle-Tested Incident Recovery: Lessons from the Front Lines</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/SRMVWC/</url>
            <location>Auditorium</location>
            
            <attendee>Jack Hughes</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>33CQKT@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-33CQKT</pentabarf:event-slug>
            <pentabarf:title>Hacktivists V2.0</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T140000</dtstart>
            <dtend>20250426T144000</dtend>
            <duration>0.04000</duration>
            <summary>Hacktivists V2.0</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Keynote</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/33CQKT/</url>
            <location>Auditorium</location>
            
            <attendee>lisa forte</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FRL7UC@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FRL7UC</pentabarf:event-slug>
            <pentabarf:title>Grand Social Engineering - DevSecOps and Influence</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T144500</dtstart>
            <dtend>20250426T152500</dtend>
            <duration>0.04000</duration>
            <summary>Grand Social Engineering - DevSecOps and Influence</summary>
            <description>DevSecOps is more than just technology—it’s a fundamental shift in mindset, culture, and collaboration. While many organizations focus on tools and automation, the real challenge lies in leading people through this transformation. This talk will explore the psychological and organizational change management techniques essential for driving a successful DevSecOps journey.  

We’ll begin by examining a change model like Kotter’s 8-Step Change Model, a structured approach to transformation that helps organizations create urgency, build coalitions, and embed lasting change. Understanding these steps enables leaders to navigate resistance and foster buy-in at all levels. We will also look psychological safety, a critical factor in high-performing teams. Using David Rock’s SCARF Model we’ll explore how to create environments where developers, security, and operations teams can collaborate without fear. Psychological safety is the foundation for open discussions, continuous learning, and innovation in security practices. Finally, Influence and communication play a crucial role in transformation. We’ll discuss key techniques such as mirroring and active listening, which enhance trust and alignment. Understanding the principles of negotiation and persuasion allows leaders and change agents to align stakeholders, overcome objections, and drive meaningful action. I will talk through my own experiences applying these models in the context of DevSecOps.

Whether you are a leader, engineer, or security professional, this talk will equip you with the tools to influence change, foster collaboration, and make an impact.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/FRL7UC/</url>
            <location>Auditorium</location>
            
            <attendee>Seb Coles</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>YVFNNG@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-YVFNNG</pentabarf:event-slug>
            <pentabarf:title>Hacking the Job Market: Double Your Chances of Landing an Ethical Hacker Role</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T153000</dtstart>
            <dtend>20250426T161000</dtend>
            <duration>0.04000</duration>
            <summary>Hacking the Job Market: Double Your Chances of Landing an Ethical Hacker Role</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/YVFNNG/</url>
            <location>Auditorium</location>
            
            <attendee>Mikael Svall</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>7BBYE8@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-7BBYE8</pentabarf:event-slug>
            <pentabarf:title>The (Un)Natural History of Malware</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T163000</dtstart>
            <dtend>20250426T171000</dtend>
            <duration>0.04000</duration>
            <summary>The (Un)Natural History of Malware</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Keynote</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/7BBYE8/</url>
            <location>Auditorium</location>
            
            <attendee>Lena Yu</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>SD3YF8@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-SD3YF8</pentabarf:event-slug>
            <pentabarf:title>Why should professionalism matter to you?</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T094500</dtstart>
            <dtend>20250426T102500</dtend>
            <duration>0.04000</duration>
            <summary>Why should professionalism matter to you?</summary>
            <description>I will provide a detailed synopsis of the move to professional registration that has been instigated by the UK Cyber Security Council, backed by central Government and funded by DSIT. There is still confusion in the technical security community about why a Professional Title matters, so I will explain the direction and the effect this is going to have on job searches in the near future. I will also talk about CPD, ethics and standards, and giving back to the industry, and how this should be recorded if you are an offensive consultant - what counts, what doesn&#x27;t, and what YOU think should count. I&#x27;ll ask attendees to give me their opinions about this and the move towards professionalisation as a whole. I&#x27;ll open the floor to questions so we can discuss whether you think this is a good idea, how much you&#x27;re willing to invest on your individual career path, and how to progress from Associate to Chartered status as your career progresses.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/SD3YF8/</url>
            <location>Seminar Room 1</location>
            
            <attendee>Debi McCormack</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>NRP3EG@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-NRP3EG</pentabarf:event-slug>
            <pentabarf:title>HODL Your Keys: How Seed Phrases Get Stolen</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T103000</dtstart>
            <dtend>20250426T105000</dtend>
            <duration>0.02000</duration>
            <summary>HODL Your Keys: How Seed Phrases Get Stolen</summary>
            <description>In this talk, we will break down how crypto wallets work, how seed phrases are generated, and the most common ways they get compromised. More importantly, we&#x27;ll arm you with best practices to keep your crypto safe. Whether you&#x27;re a seasoned trader or just starting out, this session will help you fortify your defenses in the ever-evolving landscape of digital finance.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Rookie Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/NRP3EG/</url>
            <location>Seminar Room 1</location>
            
            <attendee>Mykhailo Shtepa</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>VJACQJ@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-VJACQJ</pentabarf:event-slug>
            <pentabarf:title>One Flew Over the Auditors Nest (Dodging the Pitfalls of Compliance)</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T105000</dtstart>
            <dtend>20250426T111000</dtend>
            <duration>0.02000</duration>
            <summary>One Flew Over the Auditors Nest (Dodging the Pitfalls of Compliance)</summary>
            <description>An Information Security Management System (ISMS) is the backbone of an organisation&#x27;s approach to tackling information security. The most widely known ISMS framework, lauded through the Halls of Compliance, is ISO27001. You&#x27;ve probably heard of it! 

The ISMS is there to provide a structured approach in protecting organisational and client data in a way that is best suited to the business needs. Some businesses may have an ISMS to generally improve their information security, others may try to implement one for tendering purposes. Though many understand generally what is required, many misinterpret, overlook or outright miss areas that could result in the very foundations of the ISMS crumbling and cracking.

&quot;But what are these areas that are so often missed?&quot; I hear you cry. An excellent question!

In this talk, I will uncover the five most common nonconformities and how to effectively remediate them that I&#x27;ve encountered during my 4 year tenure as an ISO27001 Lead Auditor. Though the talk will primarily be focused on ISO27001, the knowledge gained can still be applied to any ISMS, regardless of the framework. 

So come along so you can learn from these experiences and help improve your own ISMS or - if you&#x27;re an auditor or implementer - further improve your knowledge!</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Rookie Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/VJACQJ/</url>
            <location>Seminar Room 1</location>
            
            <attendee>Chris</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>W9CQR7@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-W9CQR7</pentabarf:event-slug>
            <pentabarf:title>Black Belt Security - Lessons From Karate</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T111000</dtstart>
            <dtend>20250426T113000</dtend>
            <duration>0.02000</duration>
            <summary>Black Belt Security - Lessons From Karate</summary>
            <description>The presentation will start with an introduction and explanation of why I&#x27;m talking on this topic. I will explain that as a Nidan (second dan) black belt in karate working in cybersecurity, I&#x27;m in a position to draw lessons between the two. It will then say what it will not be: a karate class, Cobra Kai, or a history lesson.

The main part of the presentation will consider the three main aspects of karate, kihon (basics), kata (set patterns of moves), and kumite (sparring). It will explain what each of these areas are, what they require from the practitioner, and how they apply to cybersecurity. This will be backed up with anecdotes and examples that I&#x27;ve gathered during my time learning karate.

After the three main areas, the presentation will cover the &quot;black belt level&quot; of tips, the lessons that might not be obvious to a beginner but become clearer as they progress through the grades.

The presentation will take a light-hearted approach, avoiding technical descriptions or confusing jargon. No previous experience or knowledge of karate will be required.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Rookie Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/W9CQR7/</url>
            <location>Seminar Room 1</location>
            
            <attendee>Rudi van der Heide</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>ZJ8PKK@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-ZJ8PKK</pentabarf:event-slug>
            <pentabarf:title>Ctrl panic + Alt response plans + Del the drama: Best practices for incident response</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T114000</dtstart>
            <dtend>20250426T122000</dtend>
            <duration>0.04000</duration>
            <summary>Ctrl panic + Alt response plans + Del the drama: Best practices for incident response</summary>
            <description>Over 50% of organisations in the UK experienced a cyber breach or attack in the last 12 months, yet only 22% have a formalised incident response plan (DSIT Cyber Breaches survey). With organisations now relying on digital systems to operate, it’s important to consider what you do when things go wrong. Who do you contact? Who is responsible for what?  Should technical teams just switch everything off? Do we send all our staff to the pub whilst we figure this out? These are just some of the questions that businesses should consider when building their incident response plans and the technical response to an incident. 
The session will signpost attendees to a number of free incident response resources, and we will cover what you can expect from a law enforcement response to cyber attacks.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/ZJ8PKK/</url>
            <location>Seminar Room 1</location>
            
            <attendee>South West Regional Economic and Cyber Crime Unit (SWRECCU)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>KVVXM3@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-KVVXM3</pentabarf:event-slug>
            <pentabarf:title>The Uncomfortable War: Keeping Kids Safe.</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T122000</dtstart>
            <dtend>20250426T130000</dtend>
            <duration>0.04000</duration>
            <summary>The Uncomfortable War: Keeping Kids Safe.</summary>
            <description>As children become more immersed in the online world, they face unprecedented risks that many parents, educators, and even security professionals struggle to keep up with. From cyberbullying and online predators to exposure to inappropriate content and data privacy concerns, protecting kids online is becoming increasingly challenging. In this discussion, we will explore the most pressing dangers children face today, and provide practical, actionable steps that adults can take to safeguard young users. We&#x27;ll cover tools, techniques, and strategies (and maybe even make a few of our own!) to help create a safer online experience for the next generation of potential security leaders...maybe.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/KVVXM3/</url>
            <location>Seminar Room 1</location>
            
            <attendee>Joe wells</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>CDBWSY@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-CDBWSY</pentabarf:event-slug>
            <pentabarf:title>Super Pets - The Hero you didn&#x27;t know you had in your house!</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T144500</dtstart>
            <dtend>20250426T152500</dtend>
            <duration>0.04000</duration>
            <summary>Super Pets - The Hero you didn&#x27;t know you had in your house!</summary>
            <description>This session will dive into traffic distribution systems, how they work and how they are leveraged by criminal groups.  Most importantly we&#x27;ll discuss how we can look to defend ourselves.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/CDBWSY/</url>
            <location>Seminar Room 1</location>
            
            <attendee>Gary Cox</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>UHAECY@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-UHAECY</pentabarf:event-slug>
            <pentabarf:title>Buffy vs. Phishing: Slaying Cyber Threats Sunnydale Style</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T153000</dtstart>
            <dtend>20250426T161000</dtend>
            <duration>0.04000</duration>
            <summary>Buffy vs. Phishing: Slaying Cyber Threats Sunnydale Style</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/UHAECY/</url>
            <location>Seminar Room 1</location>
            
            <attendee>Andreea Mihai</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>HDPXVF@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-HDPXVF</pentabarf:event-slug>
            <pentabarf:title>Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T094500</dtstart>
            <dtend>20250426T102500</dtend>
            <duration>0.04000</duration>
            <summary>Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/HDPXVF/</url>
            <location>Seminar Room 7</location>
            
            <attendee>Balazs Bucsay</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>LQTB8N@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-LQTB8N</pentabarf:event-slug>
            <pentabarf:title>Zero to Pentester: My ‘root’ into Cyber</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T103000</dtstart>
            <dtend>20250426T105000</dtend>
            <duration>0.02000</duration>
            <summary>Zero to Pentester: My ‘root’ into Cyber</summary>
            <description>This presentation focuses on my transition into cyber security from oil &amp; gas, and how I transferred skills from a completely different role and industry to succeed in my current day-to-day role. There seems to be a misconception in the security space which leans on the idea that success in this industry only comes from graduating from university with a degree in cyber security.

Penetration testing is a consultancy-focused role (or should be), therefore client communication is a key skill. Having the ability to effectively communicate technical information to a non-technical audience is a prime example of a skill that makes a great consultant. For example, there&#x27;s a critical difference between being able to execute a complex DOM-based Cross-Site Scripting attack and the ability to explain the risk of the attack, and how it could be leveraged to contextually affect a specific system.

Although certain technical aspects will be noted in this talk, it is more weighted towards having the correct mindset and objectives. Moving from a completely different industry into one as technical as ethical hacking can be daunting, and navigating the plethora of information available can be a task in itself. However, it’s important to maintain a positive outlook and set reasonable goals, as mindset is far more powerful than prior knowledge. The old saying goes: &quot;Give a man a fish, and you feed him for a day. Teach a man to fish, and you feed him for a lifetime.&quot; The same applies to learning in cyber security.

You can either gain knowledge to overcome a single task or adopt a mindset and work ethic that allow you to tackle a hundred tasks. This goes both ways—employers should recognise talented candidates based on proven work ethic and drive, demonstrated through achievements on platforms like Hack The Box, TryHackMe, TCM Security, A Cloud Guru, and YouTube, rather than overlooking them simply for not holding a cyber security degree.

In this talk, I delve into how I progressed to the level of a Senior CTL APP Pentester, providing actionable tips for industry newcomers and those looking to transition into cyber security.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Rookie Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/LQTB8N/</url>
            <location>Seminar Room 7</location>
            
            <attendee>Ross Mitchell</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>FBYR9G@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-FBYR9G</pentabarf:event-slug>
            <pentabarf:title>Analyzing the Impact of Spectre and Meltdown Vulnerabilities on Modern Computing Systems: A Case Study</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T105000</dtstart>
            <dtend>20250426T111000</dtend>
            <duration>0.02000</duration>
            <summary>Analyzing the Impact of Spectre and Meltdown Vulnerabilities on Modern Computing Systems: A Case Study</summary>
            <description>The Illusion of Safety Superimposed on a System Prioritizing Performance

Over the years, in their pursuit of fine-tuning hardware architecture to meet our aspirations of performance and safety, designers faced a fundamental question: which one can we deliver to the public while maintaining their trust that this is a secure system?

However, this delicate balance was shattered when a fatal flaw was discovered, affecting modern architectures in a way that wasn&#x27;t fully preventable by software patches alone.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Rookie Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/FBYR9G/</url>
            <location>Seminar Room 7</location>
            
            <attendee>Mohammed Mohtesham Ali</attendee>
            
            <attendee>Abhishek Aggarwal</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>JTGJXG@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-JTGJXG</pentabarf:event-slug>
            <pentabarf:title>Custom Scripts and tools for pen testing: a beginner&#x27;s guide</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T111000</dtstart>
            <dtend>20250426T113000</dtend>
            <duration>0.02000</duration>
            <summary>Custom Scripts and tools for pen testing: a beginner&#x27;s guide</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Rookie Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/JTGJXG/</url>
            <location>Seminar Room 7</location>
            
            <attendee>Adam Crease</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>KYLMU8@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-KYLMU8</pentabarf:event-slug>
            <pentabarf:title>Cybersecurity Threats and Attacks in Modern Manufacturing</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T114000</dtstart>
            <dtend>20250426T122000</dtend>
            <duration>0.04000</duration>
            <summary>Cybersecurity Threats and Attacks in Modern Manufacturing</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/KYLMU8/</url>
            <location>Seminar Room 7</location>
            
            <attendee>Achim D. Brucker</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>CNHPUV@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-CNHPUV</pentabarf:event-slug>
            <pentabarf:title>The Single-Packet Shovel: Digging For Desync-Powered Request Tunnelling</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T122000</dtstart>
            <dtend>20250426T130000</dtend>
            <duration>0.04000</duration>
            <summary>The Single-Packet Shovel: Digging For Desync-Powered Request Tunnelling</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/CNHPUV/</url>
            <location>Seminar Room 7</location>
            
            <attendee>Thomas Stacey</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>D3TBA7@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-D3TBA7</pentabarf:event-slug>
            <pentabarf:title>Beacon Harvest: Conquering Cobalt Strike at Scale</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T144500</dtstart>
            <dtend>20250426T152500</dtend>
            <duration>0.04000</duration>
            <summary>Beacon Harvest: Conquering Cobalt Strike at Scale</summary>
            <description>Although Cobalt Strike was originally developed for ethical hacking and red teaming, the platform’s robust features have increasingly drawn the attention of malicious actors. From state-sponsored APTs to hacktivists and cybercriminals, adversaries leverage Cobalt Strike for sophisticated and stealthy attacks. In this session, we will demonstrate our end-to-end process for:

- Continuously harvesting Cobalt Strike payloads from VirusTotal
- Automating the de-obfuscation of extracted samples
- Identifying and extracting key IOCs, such as C2 infrastructure and configuration details

We will walk through the custom scripts and tooling that power this pipeline, sharing the challenges and lessons learned in scaling up analysis. Attendees will see how to convert vast quantities of malware data into timely, actionable intelligence to enhance detection, incident response, and overall security posture. By studying these real-world payloads, defenders can better understand how threat actors abuse Cobalt Strike and apply those insights to fortify their defences.</description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/D3TBA7/</url>
            <location>Seminar Room 7</location>
            
            <attendee>Ben (@polygonben)</attendee>
            
        </vevent>
        
        <vevent>
            <method>PUBLISH</method>
            <uid>33YKMS@@pretalx.com</uid>
            <pentabarf:event-id></pentabarf:event-id>
            <pentabarf:event-slug>-33YKMS</pentabarf:event-slug>
            <pentabarf:title>Paint Me Like One of Your Firmwares</pentabarf:title>
            <pentabarf:subtitle></pentabarf:subtitle>
            <pentabarf:language>en</pentabarf:language>
            <pentabarf:language-code>en</pentabarf:language-code>
            <dtstart>20250426T153000</dtstart>
            <dtend>20250426T161000</dtend>
            <duration>0.04000</duration>
            <summary>Paint Me Like One of Your Firmwares</summary>
            <description></description>
            <class>PUBLIC</class>
            <status>CONFIRMED</status>
            <category>Talk</category>
            <url>https://pretalx.com/bsides-exeter-2025/talk/33YKMS/</url>
            <location>Seminar Room 7</location>
            
            <attendee>Callum T</attendee>
            
        </vevent>
        
    </vcalendar>
</iCalendar>
