.
- Analyzing the Impact of Spectre and Meltdown Vulnerabilities on Modern Computing Systems: A Case Study
Achim is a Professor in Computer Science (Chair in Cybersecurity) and Head of the Cybersecurity Group at the University of Exeter, UK.
He has over 20 years of professional experience in cyber security in
general, and, in particular, in research and development of safety
and security critical systems. In his work, he particularly focuses
on techniques, methods, and tools for ensuring the safety, security,
correctness, and trustworthiness of advanced systems.
His industry experience includes being a Security Architect and
Security Testing Strategist for SAP SE. In this role, he defined the
risk-based security testing strategy of SAP that combines static,
dynamic, and interactive security testing methods and integrates
them deeply into SAP's Secure Software Development Life Cycle.
He is supporting security initiatives and events in the South West,
building bridges between industry, academia, and the local
community. Amongst others, he is a member of the SWCSC Steering
Committee and the BSides Exeter Steering Committee.
- Cybersecurity Threats and Attacks in Modern Manufacturing

Adam is an enthusiastic penetration tester with experience uncovering vulnerabilities and enhancing system security. Prior to entering the world of cybersecurity, he developed a strong technical foundation as a full-stack software engineer, creating robust applications across platforms. This mix of building and breaking systems has given Adam a unique lens through which he approaches his work, and he's eager to share insights from his ongoing journey in the field.
- Custom Scripts and tools for pen testing: a beginner's guide

Based in Bristol, Adrian has been working in the blue team and services world for 20 yrs, and is currently a Snr Director at Unit 42.
He’s designed, built, worked in and sold SOCs across the globe and his talks tend to be a bit of a lighthearted romp through the world of modern SecOps and how to get ahead in this fast paced world. He’s passionate about neurodiversity in cyber, and has a unique way of exploring psychology and the human side of cyber.
- Aftermath: The human cost of ransomware

- Buffy vs. Phishing: Slaying Cyber Threats Sunnydale Style

Balazs Bucsay is the founder & CEO of Mantra Information Security that offers a variety of consultancy services in the field of IT Security. With decades of offensive security experience, he is focusing his time mainly on research in various fields including red teaming, reverse engineering, embedded devices, firmware emulation and cloud. He gave multiple talks around the globe (Singapore, London, Melbourne, Honolulu) on different advanced topics and released several tools and papers about the latest techniques. He has multiple certifications (OSCE, OSCP, OSWP) related to penetration testing, exploit writing and other low-level topics and degrees in Mathematics and Computer Science. Balazs thinks that sharing knowledge is one of the most important things, so he always shares it with his peers. Because of his passion for technology, he starts the second shift right after work to do some research to find new vulnerabilities.
- Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones

Ben is massive cyber-nerd, with a passion for creative defence-evasion techniques, reverse-engineering malware and fighting adversaries! He currently works full time in a SOC for Accenture/Context Information Security. In his spare time you'll find him dissecting malware captured in his honeypots, pwning boxes and recording his solutions for his YouTube, or enjoying a pint in the pub.
- Beacon Harvest: Conquering Cobalt Strike at Scale
Callum is a Vulnerability Research consultant at CoreTech Security Services. When not doing VR for work, he's doing it for fun, specialising in iOS and other interesting platforms.
- Paint Me Like One of Your Firmwares
- One Flew Over the Auditors Nest (Dodging the Pitfalls of Compliance)

Debi heads up communications and early career development at The Cyber Scheme, an NCSC Assured examination and training company assessing competency of technical cyber security professionals at all levels, through rigorous training and mentoring courses and industry-leading technical assessments. The Cyber Scheme are also a Licensed Body for the UK Cyber Security Council, able to assess and recommend individuals for a Professional Title in Security Testing, Incident Response and non-specific Associate titles. Debi's focus is on supporting entry level talent to enter technical cyber security, raising awareness of professional registration and the importance of CPD. She also runs an innovative Sponsorship programme with the technical cyber industry where individuals can donate time and expertise, receive advance warning of legislative and industry changes from Government and other industry bodies, and liaise with like-minded professionals. Debi is a regular speaker and is passionate about encouraging women into careers in technical cyber.
- Why should professionalism matter to you?

Currently leading the technical team for UK and Ireland, Gary joined Infoblox in 2010 and has held a variety of UK and International roles over the years. Gary is a regular speaker at cyber security events of all sizes and formats and has over 25 years of IT/Security experience working across multiple verticals including finance, public sector, media and service providers. Gary is an active member of several ISC2 Chapters and held the CISSP qualification since 2016.
- Super Pets - The Hero you didn't know you had in your house!

Heather is an award-winning cybersecurity, technology, risk, and resilience leader with extensive experience across both public and private sectors. A Fellow of the Chartered Institute of Information Security and the recipient of SC Awards Europe’s “CISO of the Year 2024,” she is widely recognised for her expertise in cybersecurity, privacy, and emerging technology risk governance.
As an independent advisor, Heather provides strategic guidance to organisations globally, helping them navigate the complex intersection of cybersecurity, AI governance, privacy, and resilience, ensuring secure, responsible innovation. Previously, Heather served as the first Chief Information Security Officer at The University of Manchester and played a key role in Scotland’s public sector, leading cybersecurity efforts for the country’s first digital-first Census. In addition to leading in-house security teams, she has acted as a trusted advisor to boards and executive leadership teams.
Heather currently serves on the Privacy and Security Advisory Board for Flo Health Inc (the most downloaded women’s health app globally, with over 70 million monthly active users), the UK Advisory Council for ISC2, and the Advisory Council for Infosecurity Europe.
- Accelerating Progress: Shifting from a Reactive to Proactive Approach in Cybersecurity

Bringing over a decade of experience leading world-class incident response teams, I've had a front-row seat to the ever-evolving landscape of cyber threats. My passion lies in transforming that experience into actionable strategies that empower organisations to not only withstand attacks but emerge stronger.
My expertise spans the full spectrum of incident response, from dissecting malware to orchestrating global investigations involving forensic experts, legal teams, and crisis communication specialists. I thrive on building and leading high-performing teams, fostering a collaborative environment where technical excellence meets strategic thinking.
- Battle-Tested Incident Recovery: Lessons from the Front Lines

A final-year cybersecurity who has been researching Child Online Safety and how we all learn this cybersecurity stuff for the past 2 years.
I'm a passionate person who likes to support others and help remind them of what's possible when you don't give up.
- The Uncomfortable War: Keeping Kids Safe.
Lena Yu, also known as LambdaMamba, is the founder and Chief Researcher of World Cyber Health and Malware Village. She also launched the Malware Monsters project (Malmons). Lena has presented at CARO, Virus Bulletin, BSides Vancouver, and other conferences. Additionally, she has hosted Malware Village and organized contests at DEF CON, HITCON, BSides London, and more.
Before transitioning to malware analysis, Lena worked as a low-level developer specializing in computer architecture and RISC-V Trusted Execution Environment (TEE) research.
- The (Un)Natural History of Malware
Partner at Red Goat Cyber Security
- Hacktivists V2.0

Mikael is an AppSec manager at Outpost24 with over 10 years of experience leading ethical hacking teams. He combines technical expertise with a strong focus on mentoring and team development, helping his teams excel in identifying and addressing vulnerabilities.
- Hacking the Job Market: Double Your Chances of Landing an Ethical Hacker Role

Cyber Security Master's Student and President of Cyber Security Society.
- Analyzing the Impact of Spectre and Meltdown Vulnerabilities on Modern Computing Systems: A Case Study

A seasoned cyber security analyst with a burning passion for anything and everything related to tech, innovation and the metaverse.
- HODL Your Keys: How Seed Phrases Get Stolen

Paul's current focus is driving and leading threat modelling methodologies and secure by design strategies within business.
A highly motivated, qualified, and experienced Security Consultant and Military Veteran with over 22 years within Information Technology industry.
Paul lives in the heart of Eryri (formally Snowdonia) National Park in Wales UK and he is often found around the mountains.
Outside of work, he is average ultra runner and the co-host of the CAPB podcast.
- The Art of Threat Modelling
- Security mismatch. Organisational users have different IT expectations from system administrators. Using organisational culture to close the gap

Ross started his career in the oil and gas industry. He joined the Cyberis Academy in 2022, and through hard work and enthusiasm rapidly gained experience and qualifications becoming a Certified Cyber Scheme Team Member (CSTM), followed by passing the Cyber Scheme Team Leader exam (CSTL – Web App). He also holds Google Cloud Platform Digital Leader and Associate Cloud Engineer (GCP-ACE) qualifications. As a senior consultant in Cyberis’ technical team, Ross specialises in web applications and cloud assessments, and is an aspiring red teamer.
Ross is passionate about training and developing others looking to move into the field and enjoys getting involved in presenting and promoting both the company and the cyber industry. He was shortlisted in the “Rising Star” category at the Security Serious Unsung Heroes Awards 2023.
Ross is also a keen musician who plays in a band, recently joined a rugby team in Edinburgh, and loves spending time with his little dog, Yoshi.
- Zero to Pentester: My ‘root’ into Cyber
Something about me
- Black Belt Security - Lessons From Karate

Seb is an experienced information and security professional who specialises in DevSecOps transformation. He considers himself an Engineer first, but quickly realised in the world of DevSecOps that the skills needed to make an impact at scale were found in psychology and business, and now regularly speaks on topics of Leadership and Organisation Change.
Seb has previously held roles such as Senior Consultant @ Veracode, Senior Manager @ ClearBank, Head of DevOps @ LRQA and is now IT Infrastructure and Security Manager @ Seccl helping build a secure world class trading platform.
- Grand Social Engineering - DevSecOps and Influence
- Prompt-ing the Injection - LLMs Under Attack!
Sophia McCall is a CREST Certified Threat Intelligence Manager and works as a Strategic Threat Intelligence Lead in the cyber security industry. Passionate about encouraging diversity in industry; Sophia is also a founding member of Security Queens, a brand created to promote inclusion and diversity in cyber security, and is a chapter administrator for the Ladies of Cheltenham Hacking Society. Sophia has also previously captained Team UK at the European Cyber Security Challenge, an international ethical hacking competition, and is also a Cyber Hunter on Channel 4's Hunted. With an additional interest in intelligent transport systems and automotive security; her awards from industry include “Best Newcomer to Security”, “Most Educational Blog for User Awareness", a named "Top Female Cybersecurity Leader" and was previously a winner of the “Most Inspiring Women in Cyber” award.
- How to Hack Yourself

The SWRCCU investigate cyber dependent crimes affecting South West organisations.
We have dedicated Cyber Protect Officers who provide free and impartial cyber security guidance, workshops and resources to organisations of all sizes and sectors. This is a service offered both by ourselves and your local force’s cyber crime unit.
Our advice is based on the very latest threat intelligence from the National Cyber Security Centre (NCSC) as well as our own investigations. You can read more about how we work with the NCSC on their website.
- Ctrl panic + Alt response plans + Del the drama: Best practices for incident response

I am a penetration tester, security researcher and full-time Lego enthusiast. I have a passion for exploring and applying new (and far too complicated) attack techniques, and am constantly searching for opportunities to continue my personal development and contribute to the wider cyber security community.
- The Single-Packet Shovel: Digging For Desync-Powered Request Tunnelling