<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2026.1.1. -->
<schedule>
    <generator name="pretalx" version="2026.1.1" />
    <version>1.0</version>
    <conference>
        <title>Bsides Exeter 2026</title>
        <acronym>bsides-exeter-2026</acronym>
        <start>2026-04-25</start>
        <end>2026-04-25</end>
        <days>1</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://pretalx.com</base_url>
        
        <time_zone_name>Europe/London</time_zone_name>
        
        
        <track name="Purple" slug="6711-purple"  color="#9340ff" />
        
        <track name="Red" slug="6712-red"  color="#ff0022" />
        
        <track name="Blue" slug="6713-blue"  color="#0000ff" />
        
    </conference>
    <day index='1' date='2026-04-25' start='2026-04-25T04:00:00+01:00' end='2026-04-26T03:59:00+01:00'>
        <room name='Auditorium' guid='639e47f0-7158-599a-8931-98e60072093f'>
            <event guid='f30dcce8-c6b3-58b6-8d49-d9f7a54690c8' id='94852' code='VQAP9B'>
                <room>Auditorium</room>
                <title>From Incident to Influence - Leading through the Unexpected</title>
                <subtitle></subtitle>
                <type>Keynote</type>
                <date>2026-04-25T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>00:45</duration>
                <abstract>Security leadership isn&#8217;t a destination you reach; it&#8217;s a structure you build, one crisis at a time. Drawing on a twenty-year journey from the high-stakes environments of central government to the sharp end of security leadership, Harriet deconstructs the building blocks of a modern security leader.</abstract>
                <slug>bsides-exeter-2026-94852-from-incident-to-influence-leading-through-the-unexpected</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='94649'>Harriet Sharma</person>
                </persons>
                <language>en</language>
                <description>Beyond the technical playbooks, what are the component parts that actually hold a team together when the unexpected happens? This talk moves past the CV to explore the learned experiences, the essential soft skills, and the quiet influence required to lead when the playbooks end. 

Whether you are an aspiring leader or a seasoned security professional, you&#8217;ll leave with a clearer map of the component parts that turn a technical expert into a resilient leader.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/VQAP9B/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/VQAP9B/feedback/</feedback_url>
            </event>
            <event guid='d82dec04-11ad-5b36-b17c-9cca599a7610' id='88200' code='QLU9FP'>
                <room>Auditorium</room>
                <title>Quantify to Defend: Quantifying Risk to Drive Proactive Security Decisions</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T09:45:00+01:00</date>
                <start>09:45</start>
                <duration>00:40</duration>
                <abstract>Proactive cyber defence relies on knowing where to act first - yet many security teams still depend on qualitative risk ratings that offer limited insight into likely loss, control effectiveness, or defensive impact.

The session explores how cyber risk quantification enables a more proactive, intelligent-led approach to defence. By expressing cyber risk in measuravble terms, practitioners can anticipate where attacks are most likely to cause harm, focus defensive effort where it matters most, and justify security improvements before incidents occur. The talk positions cyber risk quantification as a practical decision-support capability that strengthens prevention, resilience, and preparedness.</abstract>
                <slug>bsides-exeter-2026-88200-quantify-to-defend-quantifying-risk-to-drive-proactive-security-decisions</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='88841'>Laurie Gibbett</person>
                </persons>
                <language>en</language>
                <description>By the end of this session, attendees will be able to:

1. Explain how cyber risk quantification supports proactive cyber defence

2. Identify high-impact threat scenarios relevant to your business

3. Prioritise defensive controls based on measurable risk reduction</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/QLU9FP/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/QLU9FP/feedback/</feedback_url>
            </event>
            <event guid='c1e769cb-141f-5005-ab22-035f93058851' id='93011' code='DYTZCY'>
                <room>Auditorium</room>
                <title>How to Land Your First Cyber Role: A DIY Approach</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2026-04-25T10:30:00+01:00</date>
                <start>10:30</start>
                <duration>00:20</duration>
                <abstract>We all know the entry-level cybersecurity job market is a mess. What often gets less attention is that the recruitment pipeline itself has become a threat surface, with job seekers routinely targeted by phishing, credential harvesting, and outright fraud.

This talk presents an intelligence-led approach to the job search, treating the hiring landscape as a target to be mapped, researched, and engaged with on your own terms. The approach was developed and tested during a journey that began in January 2025 as a foreign national in the UK with no IT background, no network, and no industry connections, and ended with a SOC Analyst role within a year.

We will explore how to uncover opportunities that never appear on job boards and how to build a targeted pipeline of employers using publicly available data. This involves understanding how to prepare for the actual, day-to-day demands of the role to ensure you do not enter the market underprepared or fall into the trap of becoming a perpetual student who never starts applying. We will discuss how active community participation supports your career path and why understanding what companies actually need matters far more than simply collecting fancy achievements.

No vendor pitches. No magic certifications. Just curiosity, methodology, and persistence.</abstract>
                <slug>bsides-exeter-2026-93011-how-to-land-your-first-cyber-role-a-diy-approach</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='93128'>Gleb Tumanov</person>
                </persons>
                <language>en</language>
                <description>Curiosity is more than just a trait for a security professional &#8212; it is a vital tool for navigating the job market. In this session, Gleb Tumanov from PureCyber Limited shares the battle-tested DIY blueprint he used to go from no industry background and no professional network in January 2025 to securing a SOC Analyst role within a year. This talk moves beyond vendor hype to address the reality of a hostile recruitment landscape where the hiring process itself is a threat surface. Whether you are an aspiring analyst, pentester, or GRC specialist, you will walk away with a pragmatic, research-driven strategy for breaking into the industry without becoming a perpetual student or falling for silver bullet solutions.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/DYTZCY/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/DYTZCY/feedback/</feedback_url>
            </event>
            <event guid='952d8f8e-a6af-5d31-940e-6c001db3cfb2' id='93090' code='3BVKMH'>
                <room>Auditorium</room>
                <title>I Simulated Hacking a Car. Then I tried to defend It. Here&apos;s What Broke!</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2026-04-25T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:20</duration>
                <abstract>Imagine your car&apos;s brakes **stop responding**. Not because of a mechanical fault, but because a **security system** is drowning out the signal. That is not science fiction. It is what can happen when intrusion detection goes wrong inside a **real-time vehicle network** built for speed, not security.

While researching for my MSc dissertation, I simulated **five attacks** against a virtual CAN bus. Some were loud and obvious. Others slipped through silently, exactly as a real attacker would intend.

But detecting the attacks was not the hardest part. **Doing it without destabilising the same safety-critical systems I was protecting** turned out to be. Rule-based detection missed the quiet ones. Machine learning flagged too much. **A hybrid approach combining both** was the only method that handled the full range reliably.

This talk explores what actually happens when **security meets a moving car**, and why detecting attacks is meaningless if the **defence itself becomes the risk**. Attendees will leave with a clearer picture of what it actually takes to **defend a vehicle network** responsibly.</abstract>
                <slug>bsides-exeter-2026-93090-i-simulated-hacking-a-car-then-i-tried-to-defend-it-here-s-what-broke</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='93200'>Rakesh Elamaran</person>
                </persons>
                <language>en</language>
                <description>Most automotive security talks focus on the attack. Very few ask what happens when the defence itself causes harm. That is the question this talk explores.

Attendees will leave understanding why detection accuracy is the wrong metric for safety critical systems and what a practical layered defence actually looks like. No prior automotive knowledge required, just curiosity about securing systems.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/3BVKMH/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/3BVKMH/feedback/</feedback_url>
            </event>
            <event guid='f835023e-6eb0-5d08-bff9-e5b33f253159' id='90299' code='U7BUHA'>
                <room>Auditorium</room>
                <title>Web Of Deception</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T11:40:00+01:00</date>
                <start>11:40</start>
                <duration>00:40</duration>
                <abstract>Attackers hack people, not just systems.

Phishing, vishing, deepfake, social engineering, and influence operations now bypass technical controls by exploiting psychology, trust, and cognitive bias. 

The human mind has become the primary attack surface, yet most awareness training still focuses on passive compliance.

Web of Deception is an interactive workshop that builds practical, human-centred defences. 
Through realistic scenarios, adversarial role-play, and collaborative challenges, participants learn how modern manipulation works, how deepfake and social engineering attacks succeed, and how to recognise deception under pressure.

Blending behavioural science, threat modelling, and creative problem-solving, the session develops adversarial thinking, emotional intelligence, and actionable techniques that can immediately strengthen teams and security culture.

A cryptic analytical challenge reinforces observation and lateral thinking throughout.

Because modern defence isn&#8217;t just technical, it&#8217;s cognitive.</abstract>
                <slug>bsides-exeter-2026-90299-web-of-deception</slug>
                <track>Purple</track>
                <logo>/media/bsides-exeter-2026/submissions/U7BUHA/WebOfDeception_1_q9PBoeh.webp</logo>
                <persons>
                    <person id='90648'>Anton Angione</person>
                </persons>
                <language>en</language>
                <description>Attackers don&#8217;t just hack systems,  they hack people.

Phishing, vishing, deepfake impersonation, and influence operations exploit language, emotion, and trust to bypass even mature technical controls. Modern social engineering targets cognition and behaviour, turning the human layer into the easiest path inside.

Web of Deception is a hands-on workshop built for Red, Blue, and Purple teams who want to understand  and counter  this tradecraft.

Through realistic scenarios, adversarial role-play, and team challenges, participants deconstruct how attackers craft persuasive narratives, manipulate sentiment, and exploit cognitive bias. 

Teams practise analysing intent, spotting linguistic and behavioural indicators, and making decisions under pressure, applying the same analytical mindset used in detection and threat hunting.

Blending behavioural science with threat modelling and creative problem-solving, the session strengthens adversarial thinking and cross-team collaboration.

A cryptic challenge woven throughout reinforces observation, semantic reasoning, and lateral thinking.

Attendees leave with practical techniques to test, harden, and defend the human attack surface.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/U7BUHA/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/U7BUHA/feedback/</feedback_url>
            </event>
            <event guid='e0440ebb-bdb8-5b8b-8e94-6407fc05ddf6' id='93661' code='YNPP3Z'>
                <room>Auditorium</room>
                <title>Stopping account takeover at the recovery layer</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T12:20:00+01:00</date>
                <start>12:20</start>
                <duration>00:40</duration>
                <abstract>Teams keep hardening login. MFA is standard, SSO is common, and passkeys are rising. Yet account takeover still happens, because attackers rarely attack the strongest part of the system. They go around it.

Account recovery is now one of the easiest paths to takeover. It is often weaker than login, treated as a one-off feature, and rarely threat-modeled after the first release. Password reset is only the visible surface. The real risk is the recovery chain including reset links, email changes, MFA reset paths, session invalidation, and subtle UX signals that reveal too much.

This talk breaks down the production failure modes that turn recovery into a bypass. User enumeration through content and timing differences. Reset tokens that can be replayed or are scoped too broadly. Tokens leaking through link previews, logs, and instrumentation. Weak throttling that either does nothing or punishes real users. Missing post-reset cleanup that leaves attacker sessions alive even after the victim changes their password.

You will leave with a practical hardening checklist you can take back to your product. Patterns for safe messaging, token lifecycle, rate limiting, monitoring signals, and a post-reset shutdown sequence that closes the gap without breaking UX.</abstract>
                <slug>bsides-exeter-2026-93661-stopping-account-takeover-at-the-recovery-layer</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='93529'>Viola Lykova</person>
                </persons>
                <language>en</language>
                <description>This session treats account recovery as privileged access, not a simple form. It breaks down the most common real-world failure modes that turn password reset into an account takeover path, then replaces them with concrete patterns that teams can implement and test. The focus is defensive engineering with enough threat awareness to make the mitigations stick. No tool worship, no theory-only talk, and no step-by-step exploitation. It is a builder-friendly map of where recovery breaks and what good looks like.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links>
                    <link href="https://www.linkedin.com/in/violaly/">LinkedIn</link>
                
                    <link href="https://youtu.be/0eePOFF-1OY?si=gd3hwR5ida56-GDD">Community Stack talk on Dec 11 2025</link>
                
                    <link href="https://youtu.be/Xw7u7kYQcq4?si=4ba-zxDmJdjSAVXC">Cypress webinar on Nov 17 2025</link>
                
                    <link href="https://youtu.be/Ym_Vj1eMhdg?si=uVAM4oQYNseABEhz&amp;t=3352">London DevSecOps talk on Feb 26 2026</link>
                </links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/YNPP3Z/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/YNPP3Z/feedback/</feedback_url>
            </event>
            <event guid='3a00d464-3fe4-50bc-a531-d762484aefa9' id='93703' code='QK3D9Q'>
                <room>Auditorium</room>
                <title>Keynote: Life as a cyber security leader: advice to my former self</title>
                <subtitle></subtitle>
                <type>Keynote</type>
                <date>2026-04-25T14:00:00+01:00</date>
                <start>14:00</start>
                <duration>00:45</duration>
                <abstract>In this presentation, Paul will reflect on his two decades in cyber security leadership (three in Information Technology), and offer his former self some advice: if I had my time again, what **would** I do differently - and what does the future hold for our amazing, but challenging, industry? I might even chuck in a couple of career anecdotes for good measure!</abstract>
                <slug>bsides-exeter-2026-93703-keynote-life-as-a-cyber-security-leader-advice-to-my-former-self</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='93544'>Paul Watts</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/QK3D9Q/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/QK3D9Q/feedback/</feedback_url>
            </event>
            <event guid='804c44b6-e5cd-51ce-8a43-8576fd5f7c0f' id='88081' code='YZZFKU'>
                <room>Auditorium</room>
                <title>The Imposter Syndrome Security Gap</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>00:40</duration>
                <abstract>Silence kills security. This session explores how confidence gaps, gatekeeping, and &#8220;expert culture&#8221; stops practitioners and wider teams from asking questions, challenging assumptions, or escalating concerns early.</abstract>
                <slug>bsides-exeter-2026-88081-the-imposter-syndrome-security-gap</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='88708'>Illyana Mullins</person>
                </persons>
                <language>en</language>
                <description>This session explores how imposter syndrome and hierarchy shape behaviour in security teams and wider organisations, especially during moments where early escalation matters most. From incident response calls to design reviews and risk sign-off meetings, we&#8217;ll look at how silence becomes normalised, how authority distorts decision-making, and why the industry&#8217;s obsession with expertise can actively undermine security outcomes.

Rather than framing this as a confidence or well-being issue, this talk treats silence as what it really is: an operational vulnerability.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/YZZFKU/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/YZZFKU/feedback/</feedback_url>
            </event>
            <event guid='e9d3338f-e0f3-57ac-85a4-8f76a228584c' id='89323' code='CXDETW'>
                <room>Auditorium</room>
                <title>Vesta Admin Takeover - Exploiting reduced seed entropy in bash $RANDOM</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T15:30:00+01:00</date>
                <start>15:30</start>
                <duration>00:40</duration>
                <abstract>Vesta is a lightweight, web-based control panel that simplifies Linux server management, appealing to users seeking an intuitive alternative to traditional platforms like cPanel and Plesk. This presentation will examine a critical flaw in Vesta: an admin takeover exploit resulting from reduced seed entropy in the Bash $RANDOM variable. By transforming what was once a theoretical attack into a practical one, we successfully reduced the brute force domain of the seed by over 98%. This allows attackers to generate predictable random values, compromising the security of passwords and tokens. We will discuss the implications of this vulnerability and highlight best practices for enhancing server security in real-world applications.</abstract>
                <slug>bsides-exeter-2026-89323-vesta-admin-takeover-exploiting-reduced-seed-entropy-in-bash-random</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='89791'>Adrian Tiron</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/CXDETW/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/CXDETW/feedback/</feedback_url>
            </event>
            <event guid='10879a31-ccbd-5797-932b-ec022db8a325' id='95110' code='W9ZHHG'>
                <room>Auditorium</room>
                <title>Curiosity made a CISO</title>
                <subtitle></subtitle>
                <type>Keynote</type>
                <date>2026-04-25T16:30:00+01:00</date>
                <start>16:30</start>
                <duration>00:45</duration>
                <abstract>A Keynote presentation - How self-driven learning builds careers 

The presenter will expose a series of vignettes from a 30+ year career in the security industry, with the theme of taking a self-learning odyssey.</abstract>
                <slug>bsides-exeter-2026-95110-curiosity-made-a-ciso</slug>
                <track>Purple</track>
                
                <persons>
                    <person id='94830'>Keri Lewis</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/W9ZHHG/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/W9ZHHG/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Seminar Room 1' guid='bb8752f6-6023-52e1-9d1d-951197ae12a8'>
            <event guid='165469c9-f0be-5539-8a44-480fe22676a8' id='88097' code='8ASG98'>
                <room>Seminar Room 1</room>
                <title>The First Hour of Incident Response - Every Second Logs!</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T09:45:00+01:00</date>
                <start>09:45</start>
                <duration>00:40</duration>
                <abstract>The first hour of incident response is often the most important. It&#8217;s the point where initial contact is made and an effort to make sense of events begins. But it&apos;s also where early mistakes can turn a contained issue into a full-blown crisis. 

This talk focuses on how to manage that critical window and avoid common pitfalls. Especially where multiple systems, stakeholders, and streams of information all demand attention at once. 

We&#8217;ll explore the pitfalls that slow teams down and show how a simple framework can help keep order. 

Using case studies and lessons learned from the field, this session highlights how the first 60 minutes set the tone for the entire response, and how to ensure that tone is calm, structured, and effective.</abstract>
                <slug>bsides-exeter-2026-88097-the-first-hour-of-incident-response-every-second-logs</slug>
                <track>Blue</track>
                <logo>/media/bsides-exeter-2026/submissions/8ASG98/First_Hour_Of_Ir_jimDHDy.webp</logo>
                <persons>
                    <person id='88723'>George Chapman</person>
                </persons>
                <language>en</language>
                <description>The first hour of incident response can set the course for everything that follows. This talk explores how to bring structure to that hour. Drawing on real-world incidents, it considers both the human and technical challenges, whilst also considering the complexity of working across a range of platforms. Against that, a practical framework is proposed to keep teams aligned when it matters most.

Attendees will leave with concrete lessons and a first-hour playbook they can adapt to their own environment, giving them confidence that their response will be sharper, calmer, and more effective when every second counts.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/8ASG98/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/8ASG98/feedback/</feedback_url>
            </event>
            <event guid='4123c19a-aa6c-5a94-b544-e68cdd76b36b' id='92190' code='7RKGYN'>
                <room>Seminar Room 1</room>
                <title>embedded Chromium everywhere! A security look at msedgewebview2 + CDP</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2026-04-25T10:30:00+01:00</date>
                <start>10:30</start>
                <duration>00:20</duration>
                <abstract>hello! Millions of desktop applications (eg: zoom, steam, &amp; vscode) ship a full Chromium browser with a debug-socket backdoor baked in. I examine how CDP -- the protocol that powers devtools -- creates some err&#8230; _minor_ weaknesses in Electron- and MsEdgeWebView2-based software. **Live demo included!**</abstract>
                <slug>bsides-exeter-2026-92190-embedded-chromium-everywhere-a-security-look-at-msedgewebview2-cdp</slug>
                <track>Blue</track>
                <logo>/media/bsides-exeter-2026/submissions/7RKGYN/image_eQCTSaR.webp</logo>
                <persons>
                    <person id='92441'>Ben Mullan</person>
                </persons>
                <language>en</language>
                <description>&lt;see cref=&quot;Abstract&quot; /&gt;</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/7RKGYN/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/7RKGYN/feedback/</feedback_url>
            </event>
            <event guid='5b9c0373-7237-52be-9606-baec395c414f' id='92037' code='FZSEVN'>
                <room>Seminar Room 1</room>
                <title>From Kerry Katona to Pen Testing.</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2026-04-25T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:20</duration>
                <abstract>Cyber is an industry an everyone. Diversity of backgrounds and experience can only strengthen our course and enhance our industry.</abstract>
                <slug>bsides-exeter-2026-92037-from-kerry-katona-to-pen-testing</slug>
                <track>Blue</track>
                <logo>/media/bsides-exeter-2026/submissions/FZSEVN/image_IAisEDr.webp</logo>
                <persons>
                    <person id='92290'>Lisa Diaz</person>
                </persons>
                <language>en</language>
                <description>I want to tell my story of how I got into cyber. Not to say ooo look at me aren&#8217;t I wonderful. But to inspire other women, career changes and anyone else interested that if I can do it - so can they!</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/FZSEVN/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/FZSEVN/feedback/</feedback_url>
            </event>
            <event guid='ca6d189d-a5b2-5494-9e4c-3fc2691aedac' id='93653' code='WUWP3W'>
                <room>Seminar Room 1</room>
                <title>When Pen Testing is Not Enough</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T11:40:00+01:00</date>
                <start>11:40</start>
                <duration>00:40</duration>
                <abstract>We&#8217;re often told &quot;don&apos;t roll your own crypto&quot; or &quot;don&apos;t build your own auth.&quot; It&#8217;s great advice for most, but it begs the question: What about the people who have to build the stuff everyone else relies on? When you&#8217;re developing the core libraries, kernels, or protocols that the rest of the world trusts, &quot;best effort&quot; security testing is simply not enough.

Standard tools like fuzzing and static analysis (SAST) are world-class at finding bugs, but they are inherently reactive. They can tell you that you have a vulnerability, but they can never prove that you don&apos;t. This raises the question of what we can, and should, do when we need to go beyond the &quot;find-and-patch&quot; cycle.

In this talk, I will explain the ideas underlying widely used security testing techniques such as fuzzing and static analysis, examining their strengths and weaknesses. This will be contrasted with a plain-English look at how formal verification, which offers the promise of being &quot;mathematically proven&quot;, allows us to show the absence of entire vulnerability classes. I will also discuss why &quot;mathematically proven&quot; isn&apos;t a silver bullet and address the practical limitations of verifying complex systems.

If you&#8217;ve ever wondered how the foundations of the internet are secured, or if you are building a component where a single bug constitutes a catastrophic failure, this session will show you how to move beyond the &quot;Whac-A-Mole&quot; of bug hunting.</abstract>
                <slug>bsides-exeter-2026-93653-when-pen-testing-is-not-enough</slug>
                <track>Blue</track>
                
                <persons>
                    <person id='93525'>Achim D. Brucker</person>
                </persons>
                <language>en</language>
                <description>The audience should have beginner-to-intermediate software development experience, i.e., being able to understand small program snippets containing typical software vulnerabilities. No deep knowledge of security testing (or formal verification) is required.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/WUWP3W/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/WUWP3W/feedback/</feedback_url>
            </event>
            <event guid='bdd70966-0319-52ba-92e8-3fa5b053fcc1' id='93347' code='EKSVGQ'>
                <room>Seminar Room 1</room>
                <title>Share to Detect: Breaking the Privacy Deadlock in OT Threat Intelligence</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T12:20:00+01:00</date>
                <start>12:20</start>
                <duration>00:40</duration>
                <abstract>Operational Technology (OT) environments face a critical paradox: sophisticated attacks like TRITON, CRASHOVERRIDE, and INCONTROLLER routinely target multiple facilities, yet operators remain blind to cross-site attack patterns due to privacy regulations, competitive secrecy, and lack of trust. The current &quot;share after detection&quot; model&#8212;where threat intelligence is exchanged only after a breach is confirmed&#8212;creates a deadly information asymmetry: attackers see the entire battlefield while defenders fight isolated skirmishes.
This talk introduces a framework that flips the paradigm to &quot;share to detect&quot;: enabling multiple OT sites (refineries, power plants, water utilities) to collaboratively identify globally significant threats before individual sites recognize them as attacks, all without exposing sensitive operational data, process telemetry, or even revealing which facility discovered which threat.
Using software &quot;hunter agents&quot; deployed at historian databases and SCADA systems, the system leverages commutative encryption and secure multi-party computation to answer the question: &quot;Is this weird PLC behavior I&apos;m seeing actually a coordinated attack happening across our industry?&quot;&#8212;without any site learning what &quot;weird&quot; looks like at competitor facilities.
We&apos;ll demonstrate how an alliance of sites can collectively validate that a suspicious Modbus command sequence appearing at 15% local prevalence at your site is actually a global IoC appearing at 87% of participating refineries&#8212;triggering immediate coordinated defense&#8212;while mathematically guaranteeing that Site A never learns Site B&apos;s process parameters, alarm rates, or asset inventory.

Attendees will learn:
- Why traditional threat intel sharing fails in OT environments
- The cryptographic primitives enabling secure threat artifact exchange
- How to deploy autonomous threat hunting agents in ICS historian infrastructure
- Real-world attack scenarios where collaborative detection provides 10-100x faster response</abstract>
                <slug>bsides-exeter-2026-93347-share-to-detect-breaking-the-privacy-deadlock-in-ot-threat-intelligence</slug>
                <track>Blue</track>
                <logo>/media/bsides-exeter-2026/submissions/EKSVGQ/image_qVxfsiO.webp</logo>
                <persons>
                    <person id='93398'>Ahmed Elmesiry</person><person id='94359'>Ofir Manor</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/EKSVGQ/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/EKSVGQ/feedback/</feedback_url>
            </event>
            <event guid='7331d4a1-ba34-5388-a0f1-93005b7e6900' id='88385' code='WVQLAW'>
                <room>Seminar Room 1</room>
                <title>SOC: THE GOOD, THE BAD &amp; THE UGLY</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>00:40</duration>
                <abstract>This presentation is a realistic look at what it is like to work in a Security Operations Center, also known as a SOC. It breaks down the experience into four parts: The Reality, The Good, The Bad, and The Ugly. All of the points will be linked with real-life events. This talk is directed to people stepping into soc analyst field, entry level analysts and soc managers as some slides speak to people with certain levels of experience in the field.

Beginning the talk by setting the stage with &quot;The Reality&quot; of a SOC environment. Next, the presentation covers &quot;The Good&quot; parts of the job. A simple view of known information, touched superficially. &quot;The Bad&quot; section discusses the downsides. 

Then, &quot;The Ugly&quot; reveals five harsh truths about SOCs.  Going deep into what I learned about SOC environment and the mistakes the team does still after years with real life examples.

Finishing off with a touch of AI and if integrating that makes it better? I explain it is not.</abstract>
                <slug>bsides-exeter-2026-88385-soc-the-good-the-bad-the-ugly</slug>
                <track>Blue</track>
                
                <persons>
                    <person id='88996'>Harish Kumar Gopalakrishnan</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/WVQLAW/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/WVQLAW/feedback/</feedback_url>
            </event>
            <event guid='97d9a864-1d89-5c54-b490-835ffe852964' id='93501' code='VUZCNS'>
                <room>Seminar Room 1</room>
                <title>Cloud &amp; Containers: The Security Puzzle That Locks Tight, From Pipeline and Package to SOC Operations</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T15:30:00+01:00</date>
                <start>15:30</start>
                <duration>00:40</duration>
                <abstract>Cloud and container security feels like a scattered puzzle: development standards, CI/CD pipelines, guardrails, runtime security, logging, monitoring, and assurance. Together they form a resilient system, but most teams run them as independent silos, and that gap is exactly where attackers operate. This talk assembles those pieces by showing their critical connections, the misconceptions that leave them exposed, and the pitfalls that trip teams up at each stage.
Start with a question most developers get wrong: are containers isolated? They are not. Every container shares the same kernel, and that single misconception underpins a whole class of attacks that application-layer tooling cannot see. From there, the puzzle builds outward. CI/CD pipelines enforce automated checks, but signing does not mean secure. The 3CX attack produced validly signed malware that passed every test, and 83% of organisations still do not verify signatures. Guardrails maintain compliance, but 65% of clusters run flat networks, making lateral movement trivial once anything is compromised. Runtime security addresses the threats that static analysis is blind to entirely. Assurance binds it together, not as a GRC exercise, but as a cryptographic chain from commit to runtime that gives defenders something they can actually prove.
With 82% of cloud breaches stemming from misconfiguration across a surface of 15.6 million cloud-native developers, the problem is not a shortage of tools. It is fragmented defences that do not reinforce each other. The talk closes by connecting the framework to blue team operations: mapping each control layer to realistic SIEM ingestion, showing how those signals connect to threat intelligence, and working through the operational questions around log preservation, forensic readiness, and account access that defenders need answered before an incident rather than during one. A cheat sheet maps every component to detection opportunities and three actions attendees can take the following morning.
If you work in detection, response, or securing cloud infrastructure, this talk gives you the framework, the attack chains, and the operational questions to take back to your team.</abstract>
                <slug>bsides-exeter-2026-93501-cloud-containers-the-security-puzzle-that-locks-tight-from-pipeline-and-package-to-soc-operations</slug>
                <track>Blue</track>
                
                <persons>
                    <person id='93494'>Ashley Barker</person>
                </persons>
                <language>en</language>
                <description>The starting point is a misconception most teams carry: that containers are isolated. They are not. Every container shares the same kernel, and CVE-2025-31133 demonstrated exactly what that means in practice, with a race condition on bind-mount operations in runc enabling read-write access to host kernel parameters and lateral movement across containers. That shared kernel is the foundation the talk builds from, working up through each layer and the controls that belong at each one. 82% of cloud breaches stem from misconfiguration and human error across a surface of 15.6 million cloud-native developers, most of whom run containers in production. The problem is not a lack of tools. It is fragmented point solutions where each piece operates without the others.
Foundations: The Shared Kernel Illusion
Namespaces are sleight of hand. They trick processes into thinking they are isolated, but syscalls still reach the kernel directly. This section covers what that means practically: why root inside a container represents roughly 40 granular Linux privileges that need stripping, why CAP_SYS_ADMIN is near-root by another name, how Seccomp filters dangerous syscalls like setns, ptrace, and mount before they execute, and why user namespace remapping is the control that makes container-root map to an unprivileged host user.
CI/CD: The Signed Malware Trap
The 3CX attack is the central case study: a supply chain compromise that targeted the build environment directly, producing malware signed with a valid certificate that passed SAST, SBOMs, and standard scanning. Supply chain compromise now accounts for 15% of all breaches, and 83% of organisations still do not verify signatures. SLSA Level 3 is the provenance and attestation framework that addresses this, ephemeral hermetic build runners are the mechanism that prevents environment compromise, and Verification Summary Attestations are the missing piece that checks whether policy outcomes were correct rather than just whether tests ran. No VSA, no deployment.
Guardrails: The Compliance Barrier
65% of clusters run flat networks, violating NIST 800-53 SC-7 boundary protection and enabling lateral movement when anything is compromised. Default-deny NetworkPolicies, service mesh with mTLS and SPIFFE workload identity for Layer 7 enforcement, and admission controllers via Kyverno or OPA Gatekeeper for policy-as-code that validates before anything reaches the cluster are the three layers that address this. Secrets management sits alongside them: 88% of breaches involve credential theft, and secrets in environment variables are visible in API server audit logs, process listings, and ServiceAccount token enumeration. External Secrets Operator injecting into tmpfs at runtime is the control.
Runtime: The Build-Only Fallacy
Static analysis is blind to zero-days, living-off-the-land attacks, and behavioural anomalies that only manifest at execution. CloudSiphon infected 150 organisations via a trojaned NGINX that ran malicious code purely at runtime, bypassing all static analysis entirely. Cluster-wide eBPF deployment gives real-time syscall, file access, and network monitoring at the kernel level. Behavioural baselining per workload type produces high-fidelity alerts with full process lineage, and drift detection runs continuously against the image manifest. The specific syscalls indicating container breakout attempts are covered in detail: setns, unshare, writes to /proc/sysrq-trigger, and writes to /proc/sys/kernel/core_pattern. Advanced evasion techniques including reflective code loading, eBPF rootkits using bpf_probe_write_user, and delayed execution via cron are each covered alongside their counters.
Visibility, Assurance and Blue Team Operationalisation
eBPF telemetry feeds OpenTelemetry, Falco picks up Kubernetes API audit events, and application traces and service mesh telemetry correlate across the stack to link user identity through pod creation to kernel execution. DORA, NIS2, and SEC requirements are mapped into policy-as-code rather than treated as point-in-time GRC snapshots. The closing section works through how a SOC operationalises the full framework: chaos engineering against security controls to validate detection, containment, and recovery; automated certificate rotation and revocation with MTTR targets measured in minutes; and VSA-driven cryptographic audit trails from commit to runtime stored in an immutable transparency log. It closes on the operational readiness questions defenders need answered before things go wrong: log preservation, forensic access to running infrastructure without destroying evidence, account auditability, and whether containment actions have been rehearsed. Three actions for Monday morning follow: mandate trust via VSAs and attestation controllers, enforce containment via policy-as-code and CAP_DROP, and deploy kernel-level visibility with behavioural baselines and automated drift response.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/VUZCNS/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/VUZCNS/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Seminar Room 7' guid='e02b20c0-816e-5fb4-baf2-996a8c9eaa9d'>
            <event guid='421b2838-32e0-545e-8b0d-07bbf4c9e7bb' id='93788' code='3H7ZAT'>
                <room>Seminar Room 7</room>
                <title>Unlocking the secrets of stripped Go binaries at runtime</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T09:45:00+01:00</date>
                <start>09:45</start>
                <duration>00:40</duration>
                <abstract>Reverse engineering Go binaries can be difficult, especially using  existing dynamic tools to interrogate program state at runtime. This talk explains how metadata in Go binaries can be used to recover data type definitions, then combined with a debugger at runtime to display the contents of complex data structures such as arrays and custom structs, even on stripped binaries.

These techniques are demonstrated in a recent release of LLEF, which is a free and open reverse engineering toolkit for LLDB developed by Foundry Zero.</abstract>
                <slug>bsides-exeter-2026-93788-unlocking-the-secrets-of-stripped-go-binaries-at-runtime</slug>
                <track>Red</track>
                
                <persons>
                    <person id='93678'>Alex M</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/3H7ZAT/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/3H7ZAT/feedback/</feedback_url>
            </event>
            <event guid='873ae87d-7384-5c62-8b3b-b754ee559d3e' id='89479' code='G3FQ8F'>
                <room>Seminar Room 7</room>
                <title>Buffer Overflows in the era of Gen-AI</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2026-04-25T10:30:00+01:00</date>
                <start>10:30</start>
                <duration>00:20</duration>
                <abstract>In today&#8217;s interconnected world, achieving complete software security is extremely challenging, as vulnerabilities continue to provide opportunities for exploitation. Buffer overflow attacks remain among the most enduring and impactful forms of software exploitation, enabling adversaries to manipulate program execution and gain unauthorized access. Although significant countermeasures such as stack canaries, Address Space Layout Randomisation (ASLR), and non-executable memory protections have been developed, buffer overflows persist due to legacy codebases, low-level programming practices, and the constant evolution of attack strategies. Recent advances in Generative Artificial Intelligence (Gen-AI) introduce a new dimension to defensive cybersecurity research and offers potential as a countermeasure through enhanced vulnerability detection, automated secure code generation, and the ability to adapt defensively to dynamic attack patterns. This project specifically evaluate the dangers of buffer overflows attacks and effectiveness of Gen-AI models in guarding against them, with a focus on recent vulnerabilities such as CVE-2025-6660 and CVE-2025-6191.</abstract>
                <slug>bsides-exeter-2026-89479-buffer-overflows-in-the-era-of-gen-ai</slug>
                <track>Red</track>
                <logo>/media/bsides-exeter-2026/submissions/G3FQ8F/Buffer_Overflow__R5Fujlh.webp</logo>
                <persons>
                    <person id='89919'>Maxime Reynaud</person>
                </persons>
                <language>en</language>
                <description>Buffer overflows are still considered a persistent threat five decades after their initial documentation,
maintained by bad programming habits, legacy codebases, unsafe programming languages and the
growing existence of IoT and embedded systems, which are often more inclined to be vulnerable due
to their nature. Although defence mechanisms have been put in place and generally adopted, ASLR,
DEP and SSP are not the perfect protection mechanisms, and always-evolving exploitation techniques
are able to bypass them. Likewise, detection and mitigation using static and dynamic analysis tools
are a good base to try to improve and find vulnerable code, but being generalised tools for all vulner-
abilities, they still incur a lot of false positives, major overhead requirements and partial coverage for
buffer overflows.
Recent advances in artificial intelligence have facilitated innovation and demonstrated promising im-
provements regarding this matter. Even if they seem to perform better than traditional techniques, the
field is still immature, and there are still a lot of improvements to achieve to have a viable long-term
solution. Their scope is often very narrow, and there is yet to be a way to adapt to new exploitation
techniques in real time without redesigning the whole model from scratch. Gen-AI potential remains
crucially unexplored in regard to buffer overflow mitigation and detection in real-world scenarios,
constituting an opportunity for future work.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/G3FQ8F/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/G3FQ8F/feedback/</feedback_url>
            </event>
            <event guid='019a2296-58f2-5cfe-a1a8-d05672cdfec1' id='92175' code='T3H3JV'>
                <room>Seminar Room 7</room>
                <title>Autopwn or Auto-Fail? The Truth About AI in Offensive Security</title>
                <subtitle></subtitle>
                <type>Rookie Talk</type>
                <date>2026-04-25T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>00:20</duration>
                <abstract>AI is rapidly becoming part of the penetration tester&#8217;s workflow, generating payloads, summarising scan results, and accelerating technical discovery. But while these tools increase speed, they also introduce a critical risk: confidence without validation.

AI can suggest vulnerabilities that don&#8217;t exist, misinterpret context, and produce output that appears convincing but lacks accuracy. In the hands of an inexperienced tester &#8212; or under time pressure &#8212; this can lead to false positives, weak findings, and ultimately poor reporting.

This talk explores how AI is actually being used in real-world pentesting, where it provides genuine value, and where it can go wrong. Through practical examples, it highlights common pitfalls and demonstrates how easily unverified AI output can make its way into reports.

More importantly, it introduces a structured approach to using AI responsibly, combining speed with validation, and technical output with real-world context. Attendees will leave with a clear framework for integrating AI into their workflow without compromising credibility or impact.</abstract>
                <slug>bsides-exeter-2026-92175-autopwn-or-auto-fail-the-truth-about-ai-in-offensive-security</slug>
                <track>Red</track>
                <logo>/media/bsides-exeter-2026/submissions/T3H3JV/image_miSqgE5.webp</logo>
                <persons>
                    <person id='92428'>Dumisani Masimini</person>
                </persons>
                <language>en</language>
                <description>AI can generate payloads, summarise scans, and even suggest vulnerabilities, but it doesn&#8217;t understand risk.

In the rush to adopt AI in penetration testing, many are producing faster results, but weaker outcomes. Findings are less validated, reports are less meaningful, and the gap between technical output and business impact is growing.

This talk challenges the hype and focuses on what actually matters: using AI as a tool, not a crutch.

By walking through real examples, we&#8217;ll explore how to turn raw AI-assisted output into clear, credible, and actionable security insights. Because in the end, the value of a pentest isn&#8217;t in the payload , it&#8217;s in the decision it drives.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/T3H3JV/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/T3H3JV/feedback/</feedback_url>
            </event>
            <event guid='463b054b-720d-5d92-8eec-b3b3c2b545ea' id='93002' code='MDYRPK'>
                <room>Seminar Room 7</room>
                <title>Shadow AI Is Your New Data Exfiltration Channel</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T11:40:00+01:00</date>
                <start>11:40</start>
                <duration>00:40</duration>
                <abstract>Being responsible for designing and implementing DLP policies in my organisation, I have seen first hand how companies suffer data loss without even realising it. The individuals exfiltrating the data are unaware what they are doing is even exfiltration of data through legitimate workflows.

Traditional Data Loss Prevention programs were built to monitor email gateways, USB devices, and cloud storage. But generative AI has introduced a new and largely unmonitored exfiltration channel.

In many organisations, AI adoption is outpacing governance. Employees restricted from using approved AI tools often turn to personal accounts or unsanctioned platforms pasting sensitive board packs, proprietary source code, and client data into public models in order to work more efficiently.

Existing DLP controls frequently fail to detect this behaviour because the activity appears legitimate and encrypted within normal web traffic.

In this talk, I explore:

How generative AI creates blind spots in traditional DLP architectures
Real-world scenarios where sensitive data leaves the organisation without triggering alerts
How red teams and malicious insiders can weaponize legitimate AI usage
Why most DLP programs measure activity instead of risk
Practical approaches to regaining visibility without shutting down innovation

This session bridges red, blue, and governance perspectives to challenge what data loss prevention really means.</abstract>
                <slug>bsides-exeter-2026-93002-shadow-ai-is-your-new-data-exfiltration-channel</slug>
                <track>Red</track>
                
                <persons>
                    <person id='93124'>Chijioke Okoye</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/MDYRPK/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/MDYRPK/feedback/</feedback_url>
            </event>
            <event guid='323097d5-47b8-560c-986a-deefdfe9a273' id='92022' code='8E8ZK7'>
                <room>Seminar Room 7</room>
                <title>Open(ish) source: Adventures in edge device memory forensics</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T12:20:00+01:00</date>
                <start>12:20</start>
                <duration>00:40</duration>
                <abstract>As defenders, over the last few years we&#8217;ve seen a seemingly relentless stream of incidents, vulnerabilities and attack campaigns targeting network edge devices and appliances. Exposed at the edge of our networks defending these devices is critical, but their proprietary and locked down operating systems mean we often lack the detection and response tools we use every day to quickly triage, investigate and remediate commodity server and client operating systems.

But under the hood, almost all modern network edge devices run some flavour of Linux. Memory collection and analysis on Linux is well supported by both commercial and open source tools such as Volatility 3. In this talk I&#8217;ll discuss some of the challenges of collecting and analysing memory on Linux-based appliances, and show how with some creativity (and a little reverse-engineering) you can often get the same level of visibility and analysis we get on more standard Linux operating systems.

Whether you&#8217;re an incident responder, part of a security team responsible for these devices or a device vendor I&#8217;ll discuss how you can be better prepared for incidents involving these types of systems and use memory analysis as a part of your investigation.</abstract>
                <slug>bsides-exeter-2026-92022-open-ish-source-adventures-in-edge-device-memory-forensics</slug>
                <track>Red</track>
                
                <persons>
                    <person id='92281'>Richard Tuffin</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/8E8ZK7/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/8E8ZK7/feedback/</feedback_url>
            </event>
            <event guid='a30be3f5-03d7-544d-8a9a-7b8a46e84d9f' id='92555' code='FQDTGJ'>
                <room>Seminar Room 7</room>
                <title>Your Browser is Snitching: Tracking Without Cookies</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>00:40</duration>
                <abstract>This talk explores the world of browser fingerprinting, how seemingly identical devices can be uniquely identified using subtle characteristics exposed by modern browsers. We will examine the specific attributes that contribute to fingerprint uniqueness, how tracking systems leverage them at scale, and the effectiveness of current evasion and anti-fingerprinting techniques.</abstract>
                <slug>bsides-exeter-2026-92555-your-browser-is-snitching-tracking-without-cookies</slug>
                <track>Red</track>
                
                <persons>
                    <person id='92779'>Adam Crease</person>
                </persons>
                <language>en</language>
                <description>This talk explores the world of browser fingerprinting, how seemingly identical devices can be uniquely identified using subtle characteristics exposed by modern browsers. We will examine the specific attributes that contribute to fingerprint uniqueness, how these can be leveraged by tracking systems and demonstrating these signals inside a browser.

Furthermore, the talk will dive into current evasion and anti-fingerprinting techniques, demonstrating what steps should be taken to reduce and avoid fingerprinting. Including ways to obfuscate or standardise signals.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/FQDTGJ/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/FQDTGJ/feedback/</feedback_url>
            </event>
            <event guid='7f25d25d-c940-5794-b0bf-9c56075a6078' id='88150' code='YW3GZV'>
                <room>Seminar Room 7</room>
                <title>&#8984;+ Ctrl: Introduction to macOS Red Teaming in 2026</title>
                <subtitle></subtitle>
                <type>Talk</type>
                <date>2026-04-25T15:30:00+01:00</date>
                <start>15:30</start>
                <duration>00:40</duration>
                <abstract>Your target runs macOS, but you don&#8217;t know your SIPs from your ESFs? And there&#8217;s no friendly Active Directory to fall back on? Where do you even begin?

This talk will give you the fundamentals you need to adapt your red team methodology to macOS with confidence. You don&#8217;t need to be Patrick Wardle to get results, but by the end of this talk you will at least know who that is. We will cover:

* Core macOS security concepts and how they will affect your operation
* Offensive and defensive security tooling
* The mindset shifts to pivot your Windows &amp; Linux skills into operating in macOS environments</abstract>
                <slug>bsides-exeter-2026-88150-ctrl-introduction-to-macos-red-teaming-in-2026</slug>
                <track>Red</track>
                
                <persons>
                    <person id='88787'>Matthew Lucas-Clarke</person><person id='88788'>Victor van der Helm</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://pretalx.com/bsides-exeter-2026/talk/YW3GZV/</url>
                <feedback_url>https://pretalx.com/bsides-exeter-2026/talk/YW3GZV/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    
</schedule>
