{"$schema": "https://c3voc.de/schedule/schema.json", "generator": {"name": "pretalx", "version": "2026.1.1"}, "schedule": {"url": "https://pretalx.com/bsides-joburg-2024/schedule/", "version": "0.7", "base_url": "https://pretalx.com", "conference": {"acronym": "bsides-joburg-2024", "title": "BSides Joburg 2024", "start": "2024-07-20", "end": "2024-07-20", "daysCount": 1, "timeslot_duration": "00:05", "time_zone_name": "Africa/Johannesburg", "colors": {"primary": "#012066"}, "rooms": [{"name": "Track 1", "slug": "3237-track-1", "guid": "c4b5e025-c2f5-5ea5-80b8-d45e052827e6", "description": null, "capacity": null}, {"name": "Track 2", "slug": "3238-track-2", "guid": "5cc8d622-1b2e-58f9-aa3a-b23cd573b466", "description": null, "capacity": null}], "tracks": [], "days": [{"index": 1, "date": "2024-07-20", "day_start": "2024-07-20T04:00:00+02:00", "day_end": "2024-07-21T03:59:00+02:00", "rooms": {"Track 1": [{"guid": "b6ca530d-0fe2-5ace-8841-beaefa06ba04", "code": "3P7UCW", "id": 51943, "logo": null, "date": "2024-07-20T09:00:00+02:00", "start": "09:00", "duration": "00:30", "room": "Track 1", "slug": "bsides-joburg-2024-51943-opening", "url": "https://pretalx.com/bsides-joburg-2024/talk/3P7UCW/", "title": "Opening", "subtitle": "", "track": null, "type": "Event Session", "language": "en", "abstract": "Opening of BSides Joburg 2024 by the organizing team", "description": "Opening talk of BSides Joburg 2024", "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/3P7UCW/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/3P7UCW/", "attachments": []}, {"guid": "d4b07475-123e-52c7-a4ac-be571e438805", "code": "RJ8DYV", "id": 53560, "logo": null, "date": "2024-07-20T09:30:00+02:00", "start": "09:30", "duration": "00:45", "room": "Track 1", "slug": "bsides-joburg-2024-53560-could-za-be-1337-what-if-we-cast-off-the-dark-and-lead-the-way-to-a-new-dawn", "url": "https://pretalx.com/bsides-joburg-2024/talk/RJ8DYV/", "title": "Could ZA be 1337? What if we cast off the dark and lead the way to a new dawn", "subtitle": "", "track": null, "type": "Keynote", "language": "en", "abstract": "What if South Africa weren\u2019t just consumers, but renowned in the global cyber community; known for our innovative people, groundbreaking contributions, and pioneering companies? What would that look like, how could we get there, and would it be worth it?\r\n\r\nPrevailing winds suggest we are at the start of a decline: a dwindling pool of entrants, an erosion of skills, and a market too narrow to sustain or inspire greatness. This slow death spiral threatens to undermine what we could be.\r\n\r\nIn this keynote, I want to warn us away from the dark path, and towards a future where South Africa is propelled from an increasingly tenuous periphery to the centre of all things cyber.", "description": "I\u2019m not a futurist, but I\u2019ve gotten ok at seeing what\u2019s coming - and South Africa\u2019s cyber security is in a state. \r\n\r\nWith barely 4% of those who write Matrix graduating with some sort of technical qualification a few years later - and few places willing to take on and train new entrants, we have a pipeline problem.\r\n\r\nWith mid-level skills emigrating - we have too few replacement, and too few people to train the newbies.\r\n\r\nThe remaining seniors are expensive, and need to deploy their skills towards commercial activity to sustain that expense.\r\n\r\nThis creates a market where only the biggest/richest companies can afford cyber security skills. The top 100 are over-serviced, while the middle 1000 are under serviced.\r\n\r\nBut BigCo\u2019s aren\u2019t always there to help - some use their purchasing power to push for the lowest price - only willing to pay top dollar for international skills or when poaching. The latter, combined with emigration serving to drive double digit salary growth in cyber year on year, while price increase are low single digits.\r\n\r\nThis creates a race to the bottom where those supplying the skills are squeezed to find more and more cost savings - turning to employing people outside South Africa, or selling their skills outside the country - further exacerbating the skills available in country.\r\n\r\nThen, the people who do best in a race to the bottom are criminals, the corrupt and the dishonest. And with security often a market for lemons - the buyers can\u2019t always discern.\r\n\r\nThis leaves little opportunity for new startups to enter a market occupying either extremes - with few with the skills to train, let alone able to afford to train.\r\n\r\nBut what could it look like instead?\r\n\r\nA country renowned for cyber, with a thriving community, numerous top-tier researchers and companies. New entrants would be excited to join because they could accelerate into a scare skills niche with worldwide employability. Companies would have growing cyber teams able to provide well paid careers for these people. The market would be better able to discern and afford top tier skills, while also having better options at the mid-level, avoiding charlatans. South Africa\u2019s renown for cyber would earn more opportunity outside the country, serviced remotely from within ZA. The forex would benefit the economy more generally. The work would further serve to give our people more and varied experience - driving more innovative research contributions and pioneering companies.\r\n\r\nHow could we get there?\u2028\u2028We need to fix a few things:\r\n* The community\r\n* The market\r\n* The training pipeline\r\n* The research\r\n* The support for entrepreneurs \r\n\r\nBut it\u2019s doable. Cyber is still small enough to have an outsized impact. We don\u2019t need to fix all of South Africa\u2019s problems to do it. And some of where we\u2019re at are opportunities.\r\n\r\nWill you try dent the world with me?", "recording_license": "", "do_not_record": false, "persons": [{"code": "CHEUEE", "name": "singe", "avatar": "https://pretalx.com/media/avatars/CHEUEE_ubJbNSH.webp", "biography": "Long time hacker and cybersecurity researcher and more recently, business leader.", "public_name": "singe", "guid": "a2065ecd-030a-5465-9139-a8a99d6b2623", "url": "https://pretalx.com/bsides-joburg-2024/speaker/CHEUEE/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/RJ8DYV/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/RJ8DYV/", "attachments": []}, {"guid": "5fc4da22-837e-5aca-881a-6b3f7c61f402", "code": "37JJQD", "id": 50458, "logo": null, "date": "2024-07-20T10:30:00+02:00", "start": "10:30", "duration": "00:45", "room": "Track 1", "slug": "bsides-joburg-2024-50458-terribly-layered-security-the-common-security-failings-of-cryptography-implementations-for-mobile", "url": "https://pretalx.com/bsides-joburg-2024/talk/37JJQD/", "title": "Terribly Layered Security - The common security failings of cryptography implementations for mobile", "subtitle": "", "track": null, "type": "Standard Talk", "language": "en", "abstract": "This talk will delve into the intricate world of transport security, specifically within mobile applications, highlighting the terrifying vulnerabilities that can be introduced into your applications unknowingly. We will explore how these security flaws can be exploited by threat actors, compromising data integrity and user privacy. The presentation will cover critical aspects such as host name validation, certificate chain validation, certificate/public key pinning and even the use of custom cr", "description": "1. Introduction to Transport Layer Security\r\n- Brief overview of TLS\r\n- Impact and severity of exploitation\r\n\r\n2. Host Name Validation\r\n- Detailed look at the process of host name validation\r\n- Tools and techniques for detection \r\n- Demonstrating real-world attacks against improper host name validation\r\n\r\n2. Certificate Chain Validation\r\n- Detailed look at the process of certificate chain validation\r\n- Tools and techniques for detection\r\n- Demonstrating real-world attacks against improper chain validation.\r\n\r\n3. Certificate Pinning\r\n- Explanation of certificate pinning and its importance\r\n- Tools and techniques for detection\r\n- How to implement certificate pinning with OkHTTP\r\n- Demonstrating real-world attacks against certificate pinning\r\n\r\n4. Custom Cryptography\r\n* What does custom cryptography on top of TLS look like\r\n* Does it provide any security benefits\r\n* Does it pose any risk\r\n* Examples of real-world attacks against custom cryptography implementations\r\n\r\n5. Live Demonstrations\r\n- Recorded demonstrations of all of the above, and combinations of the controls\r\n- Interactive session with audience participation\r\n- Demonstrating real-world attacks against improper host name validation", "recording_license": "", "do_not_record": false, "persons": [{"code": "MRV3GQ", "name": "Connor du Plooy", "avatar": "https://pretalx.com/media/avatars/MRV3GQ_y7MpZMl.webp", "biography": "Connor and Andre work as mobile security consultants for MWRCybersec. Both speakers are passionate about reverse engineering and making their corner of the world safer.", "public_name": "Connor du Plooy", "guid": "36f367d0-2ca1-514e-95b7-1b02b8bc9063", "url": "https://pretalx.com/bsides-joburg-2024/speaker/MRV3GQ/"}, {"code": "3LGDYF", "name": "Andre Lopes", "avatar": "https://pretalx.com/media/avatars/3LGDYF_Zr2qj5O.webp", "biography": "I am a developer who became a security consultant in order to gain more perspective as to how other organisations build their infrastructure and handle their security. I am currently working in mobile division at MWR Cybersec.", "public_name": "Andre Lopes", "guid": "25cff5f9-2235-58e2-8187-c1703977bb87", "url": "https://pretalx.com/bsides-joburg-2024/speaker/3LGDYF/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/37JJQD/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/37JJQD/", "attachments": []}, {"guid": "0f16ecf6-7182-5107-8769-672bc79ea3e3", "code": "9BAXW9", "id": 48581, "logo": null, "date": "2024-07-20T11:20:00+02:00", "start": "11:20", "duration": "00:45", "room": "Track 1", "slug": "bsides-joburg-2024-48581-doppelganger-devices-investigating-fake-iphones-security-implications", "url": "https://pretalx.com/bsides-joburg-2024/talk/9BAXW9/", "title": "Doppelg\u00e4nger Devices: Investigating Fake iPhones & Security Implications", "subtitle": "", "track": null, "type": "Standard Talk", "language": "en", "abstract": "In this presentation, I delve into the world of counterfeit iPhones, examining their security risks and offering practical methods for distinguishing fake devices. Through thorough forensic analysis and penetration testing, I aim to uncover vulnerabilities and provide strategies to enhance user security. Join me as we explore the implications of doppelg\u00e4nger devices and how to navigate the counterfeit landscape in today's digital world.", "description": "Counterfeit electronic devices, particularly fake iPhones, have become increasingly prevalent in global markets. These devices mimic the appearance and functionality of authentic iPhones but are often of inferior quality and pose significant security risks to users. This proposal seeks to investigate the phenomenon of doppelg\u00e4nger devices, focusing on counterfeit iPhones, and analyse their security implications. \r\n \r\nFurthermore, the proposal aims to investigate the security vulnerabilities inherent in fake iPhones. Counterfeit devices may contain malicious hardware or pre-installed malware, posing threats such as data theft, financial fraud, and surveillance. By conducting penetration testing and forensic analysis, we will identify potential security weaknesses in doppelg\u00e4nger devices and assess their implications for end-users, enterprises, and cybersecurity professionals.\r\n \r\nThe findings of this research will contribute to the understanding of counterfeit electronics and their security risks, providing valuable insights for cyber security specialist and end-users. Moreover, the study will propose strategies for mitigating the impact of fake iPhones on consumer safety and cybersecurity, including consumer education initiatives, and technical solutions where applicable.\r\n \r\nI have managed to procure a counterfeit device and intend to show off its capabilities. My proposal seeks to delve into the acquired counterfeit iPhone, aiming to address the following inquiries:\r\nHow can users swiftly and accurately discern the authenticity of an iPhone, especially when counterfeit versions have circumvented standard online verification checks?\r\nDoes the counterfeit device engage in the harvesting of user credentials?\r\nIs there evidence of communication with a remote server?\r\nWhat operating system and methodologies were employed in its fabrication?\r\nAre there any backdoor access points or hidden functionalities within the counterfeit iPhone that could compromise user privacy or security?\r\nWhat security vulnerabilities are present in the counterfeit iPhone, and how do they compare to those found in authentic devices?\r\n \r\nIn summary, this proposal seeks to investigate doppelg\u00e4nger devices, with a focus on counterfeit iPhones, and analyse their security implications. By uncovering the hidden dangers of fake electronics, this research aims to safeguard users and promote a more secure digital ecosystem.", "recording_license": "", "do_not_record": false, "persons": [{"code": "AAQHMS", "name": "Ansie Brough Williamson", "avatar": "https://pretalx.com/media/avatars/AAQHMS_HOo0SzK.webp", "biography": "Ansie Brough is a Senior Cyber Security Consultant and Head of Digital Forensics & Incident Response at Redshift Cyber Security (Pty) Ltd. Joining Redshift in 2020, Ansie quickly rose to become Head of Mobile, where she identified a lack of accessible mobile security training, leading her to release a Mobile Security YouTube series. Passionate about digital forensics, she transitioned to Head of Digital Forensics and Incident Response, boasting multiple certifications in both fields. Ansie aims to integrate her expertise in mobile security and digital forensics to enhance cybersecurity practices in her presentations and initiatives.", "public_name": "Ansie Brough Williamson", "guid": "b2e33e6a-dd71-5927-abfc-b9939cadc242", "url": "https://pretalx.com/bsides-joburg-2024/speaker/AAQHMS/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/9BAXW9/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/9BAXW9/", "attachments": []}, {"guid": "3427c56f-543d-59a1-833f-9d8fa9151b3f", "code": "ZCCRWX", "id": 51942, "logo": null, "date": "2024-07-20T12:10:00+02:00", "start": "12:10", "duration": "00:45", "room": "Track 1", "slug": "bsides-joburg-2024-51942-certpinning-openssl-and-memory-patching-sounds-fun-right", "url": "https://pretalx.com/bsides-joburg-2024/talk/ZCCRWX/", "title": "Certpinning, OpenSSL and Memory Patching. Sounds fun right?", "subtitle": "", "track": null, "type": "Standard Talk", "language": "en", "abstract": "This is a technical and theoretical talk on an alternative approach to bypassing certificate pinning by using Frida to change values in memory. It will cover my research on certificate pinning over the last few months, mainly within an Android mobile context.", "description": "This approach differs from the usual approach of using function hooking by being more difficult, less practical and far less reliable. This is a novel technique for bypassing a security control, rather than being a vulnerability.\r\n\r\nThe following section will be covered by the talk:\r\n- Introduction to what certificate pinning is.\r\n- The different methods typically employed to implement certificate pinning.\r\n- How certificate pinning is typically bypassed.\r\n- Using memory patching to bypass certpinning.\r\n- Future research and understanding where OpenSSL fits in. (Hint: everywhere)", "recording_license": "", "do_not_record": false, "persons": [{"code": "Y3WS7S", "name": "Isak van der Walt", "avatar": "https://pretalx.com/media/avatars/Y3WS7S_O030R1d.webp", "biography": "Security analyst @ OrangeCyberdefense with a keen interest in mobile security and electronics.", "public_name": "Isak van der Walt", "guid": "6edcb369-5d84-5a0f-a8db-79fbeb1d85a8", "url": "https://pretalx.com/bsides-joburg-2024/speaker/Y3WS7S/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/ZCCRWX/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/ZCCRWX/", "attachments": []}, {"guid": "d8a59dcc-554a-5134-9556-d60bcd4d36c0", "code": "KXAYZT", "id": 51011, "logo": "https://pretalx.com/media/bsides-joburg-2024/submissions/KXAYZT/ChatGPT_ofv2C7Y.jpg", "date": "2024-07-20T13:45:00+02:00", "start": "13:45", "duration": "00:15", "room": "Track 1", "slug": "bsides-joburg-2024-51011-the-ciso-s-field-guide-to-genai", "url": "https://pretalx.com/bsides-joburg-2024/talk/KXAYZT/", "title": "The CISO's Field Guide to GenAI", "subtitle": "", "track": null, "type": "Lightning Talk", "language": "en", "abstract": "The aim of the talk is to equip cybersecurity practitioners with a comprehensive understanding of GenAI, its impacts on business and suggest strategies on securing GenAI for use in the enterprise.", "description": "The talk will cover:\r\n1. GenAI overview - key pillars and context\r\n2. Security issues in the GenAI landscape\r\n3. Strategies to manage and mitigate (some of) the risks.", "recording_license": "", "do_not_record": false, "persons": [{"code": "QDH8XQ", "name": "Samresh Ramjith", "avatar": "https://pretalx.com/media/avatars/QDH8XQ_qMlpyqW.webp", "biography": "Samresh is a Partner in Deloitte Africa\u2019s Risk Advisory practice based in Johannesburg and is the current leader of the Africa Cyber practice. His cyber experience spans more than 20 years in the Sub-Saharan cybersecurity industry.\r\nHis core experience spans deep technical roles through to executive business and people management, across market sectors. He qualified as an Electronic Engineer, before moving into software development and system engineering roles. He then qualified as a firewall engineer, before moving into pre-sales, cybersecurity consulting, and business management roles. He holds a Master\u2019s degree in digital business, as well as several cybersecurity specific certifications, most notably CISSP (2009) and CISM (2010).\r\nHe was the Deputy CISO at ABSA Group, where he led the Cyber Security Consulting Service Group which comprised of Lead Security Consultants, Security Architects & Research teams. He also chaired the SABRIC Cybersecurity Forum, driving banking sector-wide engagement on topical cybersecurity matters. His prior work experience includes leadership roles in EY Africa, IBM Global Security Services and Dimension Data MEA.", "public_name": "Samresh Ramjith", "guid": "95efa62b-16fd-5455-aab5-9527dfa99df9", "url": "https://pretalx.com/bsides-joburg-2024/speaker/QDH8XQ/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/KXAYZT/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/KXAYZT/", "attachments": []}, {"guid": "69bc026e-4704-5209-bc9e-7e642aa4b166", "code": "CDAUVR", "id": 50735, "logo": null, "date": "2024-07-20T14:00:00+02:00", "start": "14:00", "duration": "00:15", "room": "Track 1", "slug": "bsides-joburg-2024-50735-i-ve-seen-you-get-hacked-ai-real-time-attack-simulation", "url": "https://pretalx.com/bsides-joburg-2024/talk/CDAUVR/", "title": "I've seen you get hacked! (AI Real-Time Attack Simulation)", "subtitle": "", "track": null, "type": "Lightning Talk", "language": "en", "abstract": "Imagine running multiple threat models, attack trees and graphs \u2013 simultaneously - on real-time asset cartography, vulnerability data and threat intelligence. Leveraging AI for predictive analytics, you could proactively defend regardless of the dynamics and turbulence presented in the emerging technology, attacker or vulnerability landscape. This is how we did it - and what we learnt.", "description": "Attack simulation, emulation and modelling offer defenders insights into the potential for a risk to be realised. We can understand threats, vulnerabilities and impact helping us prioritise our remediation efforts. In a world where we are required to defend against asymmetric cyber-attack; how we use and focus limited security resources is an essential part of artful defence.\r\n\r\nMost defenders use physical simulation (such as penetration testing) or emulation (such as virtual twins). Attack modelling require less resource, making it cost-effective and easy to scale. However, it is a point-in-time, desktop exercise, where risk is in the eye of the beholder. Therefore it produces a lower fidelity output. The question we asked ourselves: How can we improve modelling fidelity to perform continuous real-time cyber risk assessment?\r\n\r\nIn this talk we will demonstrate an AI-based platform developed to run simulations, in real-time, on network and internet data at scale. Classifying and prioritising threat and vulnerability incident response in a dynamic asset landscape. Could this empower you to have a predictive and proactive posture? Join the talk and demonstration to find out!", "recording_license": "", "do_not_record": false, "persons": [{"code": "RB9KHD", "name": "nithen", "avatar": "https://pretalx.com/media/avatars/RB9KHD_t4uKZis.webp", "biography": "Nithen Naidoo is the founder of Snode Technologies, a South African Cyber Defence firm. Snode's homegrown technologies have won international recognition, most notable is the DTI\u2019s South African Innovation Award in 2020.", "public_name": "nithen", "guid": "bb369eb0-5e76-5617-ae6d-a0f46393ad47", "url": "https://pretalx.com/bsides-joburg-2024/speaker/RB9KHD/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/CDAUVR/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/CDAUVR/", "attachments": []}, {"guid": "159810b6-69fb-5fb1-a857-db0de54fed51", "code": "WVBZZL", "id": 51881, "logo": null, "date": "2024-07-20T14:15:00+02:00", "start": "14:15", "duration": "00:15", "room": "Track 1", "slug": "bsides-joburg-2024-51881-is-chatgpt-a-friend-of-foe-to-ctf-competitions", "url": "https://pretalx.com/bsides-joburg-2024/talk/WVBZZL/", "title": "Is ChatGPT a friend of foe to CTF competitions?", "subtitle": "", "track": null, "type": "Lightning Talk", "language": "en", "abstract": "Capture the Flag (CTF) events have become a popular format for ethical hacking competitions, offering participants invaluable opportunities to practice and hone their cybersecurity skills. With the release of ChatGPT, an artificial intelligence (AI)-based chatbot, the question now is: Can ChatGPT solve CTF challenges?", "description": "CTF competitions offer an interactive environment to promote cybersecurity education, allowing students to gain hands-on experience solving cybersecurity challenges in a fun but controlled environment. One such initiative is the Cyber Security Challenge (CSC), first introduced in 2017 and organised by the South African National Research Network (SANReN). However, the emergence of ChatGPT has raised concerns regarding the possible influence of technology on the learning ability offered by CTF events. ChatGPT presents the capability to instantly respond to various text-based questions following a conversational approach. The typical style of CTF challenges usually follows a question-answer format, which offers students the ideal opportunity to enlist the assistance of ChatGPT.\r\n\r\nThis talk will briefly discuss the ability of ChatGPT to solve CTF challenges.\r\n\r\nQuestions to consider:\r\n- Are structural changes required to CTF challenges?\r\n- Should ChatGPT be permitted or even encouraged?", "recording_license": "", "do_not_record": false, "persons": [{"code": "WZLMLV", "name": "Heloise Meyer", "avatar": "https://pretalx.com/media/avatars/WZLMLV_CMuej1m.webp", "biography": "Heloise Meyer is currently employed as a senior member of the CSIRT within the SANReN group that forms part of the NICIS center at the CSIR. She completed her PhD Computer Science degree in 2019, with a focus on identifying the authenticity of smartphone data. Her interests include digital forensics, mobile security and cyber security.", "public_name": "Heloise Meyer", "guid": "7e5aee20-9daf-5baa-b827-6d76dd3fce9a", "url": "https://pretalx.com/bsides-joburg-2024/speaker/WZLMLV/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/WVBZZL/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/WVBZZL/", "attachments": []}, {"guid": "cf34e0c9-0f41-55d4-9d12-9138ea484e3a", "code": "WCRBRA", "id": 48657, "logo": null, "date": "2024-07-20T14:40:00+02:00", "start": "14:40", "duration": "00:45", "room": "Track 1", "slug": "bsides-joburg-2024-48657-cybersecurity-in-the-boardroom-from-risk-to-strategic-advantage", "url": "https://pretalx.com/bsides-joburg-2024/talk/WCRBRA/", "title": "Cybersecurity in the Boardroom: From Risk to Strategic Advantage", "subtitle": "", "track": null, "type": "Standard Talk", "language": "en", "abstract": "Cybersecurity is no longer just an IT concern; it's a critical business issue demanding boardroom attention. This talk dives into the evolving threat landscape and its potential impact on an organization's reputation, finances, and operations.", "description": "I'll explore key areas for board oversight, including:\r\n- Understanding cyber risks in business terms\r\n- Translating technical jargon into actionable insights\r\n- Building a culture of security awareness across the organization\r\n- Developing a proactive cybersecurity strategy aligned with business goals\r\n\r\nThe talk will showcase successful strategies for board engagement and provide practical steps for directors to  transform cybersecurity from a burden to a strategic advantage.", "recording_license": "", "do_not_record": false, "persons": [{"code": "NGHRWB", "name": "Sandika Daya", "avatar": "https://pretalx.com/media/avatars/NGHRWB_sWi4fOU.webp", "biography": "Sandika is a technology governance, risk and compliance leader with 17 years of experience in IT audit, assurance and advisory in the banking and broadcast industries. She provides strategic oversight in IT, digital, audit, risk, social and ethics committees as an independent committee member for various organisations. Sandika also provides strategic direction for digital products as an advisory board member. She holds a BSc in Computer Science and Applied Mathematics and is currently pursuing her Master\u2019s in Digital Transformation and Innovation Leadership. She speaks publicly on all things digital.", "public_name": "Sandika Daya", "guid": "cb18a0ea-7467-5142-aebb-1362e484ae3e", "url": "https://pretalx.com/bsides-joburg-2024/speaker/NGHRWB/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/WCRBRA/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/WCRBRA/", "attachments": []}, {"guid": "c0ae6809-8a74-5b50-85a6-f37bce32a56b", "code": "XSCSJG", "id": 50529, "logo": null, "date": "2024-07-20T15:40:00+02:00", "start": "15:40", "duration": "00:45", "room": "Track 1", "slug": "bsides-joburg-2024-50529-hacking-the-airwaves", "url": "https://pretalx.com/bsides-joburg-2024/talk/XSCSJG/", "title": "Hacking The Airwaves!", "subtitle": "", "track": null, "type": "Standard Talk", "language": "en", "abstract": "This talk will dive into the world of hacking wireless communication, focusing on the automotive industry, access control, and IoT communications. We will jump into the mind of how attackers view wireless communication and explore various attack vectors that could allow them to unlock your car and drive away or bypass your office access control to gain access to sensitive areas such as the server room.", "description": "1. Introduction\r\n\r\nAn introduction to radio frequency hacking and the topics that are going to be covered during the talk. The talk will mostly cover the types of attacks that already exist, with less focus on defence. The main aim of the talk is to raise security awareness surrounding radio frequency hacking.\r\n\r\n2. Tooling\r\n\r\nIntroduction on the tooling that is going to be used during the talk and what attackers might use. Quick demonstration of how it works and to show the attacker's mindset when it comes to radio hacking. (Demo 1).\r\n\r\n3. Automotive attacks\r\n\r\nAn explanation of how car keyfobs work with rolling codes and how they prevent replay attacks. Following the rolling code explanation, there will be a short demo to illustrate how an attacker can capture these signals. \r\n\r\nThis explanation will aid in understanding potential weaknesses of rolling code communication and how attackers could exploit this to perform various actions, such as unlocking or starting the car. This will be followed by a demo of how an attacker could analyse the 2012-2017 Kia Rio's rolling code communication and use it to brute force or predict rolling codes to unlock the car (Demo 2).\r\n\r\nWith this knowledge we will also go through some of the security considerations of the rolling code communication, ending with how encryption can be a good mitigation, but not a complete fix. This will include an explaination of how attackers could break the cryptography, extracting information from the keyfob itself on a hardware level. \r\n\r\nFor more practical examples, a conceptual explanation of the Roll Back Attack and demonstrations of how the attack is performed on a Mazda CX-5 and Hyundai i20 to unlock or start the car will be shown. (Demo 3) \r\n\r\nUnderstanding how keyless entry and start works and what an attacker might want to target to exploit it will form the final part of the automotive component of the talk. We will go through a conceptual explanation of the Relay attack and have a demonstration of how the attack is performed on a Mazda CX-5 to unlock and start the car. (Demo 4). Emphasising the dangers of this attack, as it leverages the principles of radio communication and not a flaw within the technology itself as well as going through potential defenses for this attack will allow us to further understand the core issues. This will also focus on how attacker techniques had to evolve to perform this attack due to different living environments around the world.\r\n\r\n4. Access Control\r\n\r\nDue to similarities between automotive attacks and how access control cards work, we will use the knowledge developed from the previous part to understand how basic access control cards work. (Demo 5)\r\n\r\nThis will highlight the potential shortfalls of physical access control with access cards such as Access Card Cloning and cracking with a quick demonstration. It will also contain a conceptual explanation of how the Relay Attack used on cars can also be used with access control as well as potential defenses for the attack.\r\n\r\n5. More RF Attacks\r\n\r\nBasic jamming concepts, explaining how jamming can be used against cars and exploring attacks such as jamming keyless start or jamming the car tracker will be discussed. We will also take a brief dive into how jamming can be used to bring down services in corporations (WiFi), mining, and hospitals, which will include a demonstration of how a jamming attack can work (Demo 6). We will also discuss some potential defenses against jamming.\r\n\r\n6. Closing remarks\r\n\r\nQuick recap on some of the topics that we covered, then explaining the overall impact RF attacks could have and why it should matter to us as security professionals.\r\n\r\nDemos in presentation:\r\n\r\nDemo 1: How the tooling works\r\nDemo 2: Demonstration of how attackers can capture and analyse Kia Rio rolling codes to perform a brute force attack to unlock the car\r\nDemo 3: Demonstration of the Rollback Attack on Mazda CX-5 and Hyundai i20 to unlock the car \r\nDemo 4: Demonstration of the Relay Attack on Mazda CX-5 keyless start\r\nDemo 5: Demonstration of how access cards could be cloned/cracked\r\nDemo 6: Demonstration of how a jamming attack can jam car trackers, keyless start, and wifi", "recording_license": "", "do_not_record": false, "persons": [{"code": "WVYTXV", "name": "Robin Roodt", "avatar": "https://pretalx.com/media/avatars/WVYTXV_Atl66v4.webp", "biography": "I am an ambitious and adaptive individual with a logical mindset and practical approach to problem solving. This makes me good at analyzing and extracting information to make sure that the team understands the problem and their roles on how to solve it. This also allows me to see where possible improvements can be made within the company to enhance overall performance of the team to give the best possible results. I am eager to be challenged to grow and further my current skills. My greatest passion in life is to provide innovative solutions to current challenges.", "public_name": "Robin Roodt", "guid": "f8d6de49-03a7-5a33-84b2-2a427257e583", "url": "https://pretalx.com/bsides-joburg-2024/speaker/WVYTXV/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/XSCSJG/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/XSCSJG/", "attachments": []}, {"guid": "da45e611-fd23-5051-8128-dcd9a5ba0cb7", "code": "9KAXBT", "id": 50993, "logo": null, "date": "2024-07-20T16:30:00+02:00", "start": "16:30", "duration": "00:45", "room": "Track 1", "slug": "bsides-joburg-2024-50993-from-overheating-to-overachieving-a-comedic-tale-of-hacking-my-car", "url": "https://pretalx.com/bsides-joburg-2024/talk/9KAXBT/", "title": "From Overheating to Overachieving: A Comedic Tale of Hacking My Car", "subtitle": "", "track": null, "type": "Standard Talk", "language": "en", "abstract": "Embark on a humorous and enlightening journey into the world of car hacking in this developer-focused conference talk. As my trusty old car overheated and befuddled multiple repair shops, I decided to take matters into my own hands. Armed with an OBD connector, I ventured to uncover the secrets hidden within my vehicle's systems.\r\n\r\nIn this presentation, I'll guide you through the process of reverse engineering, offering a brief Electronics 101 for beginners. Discover how I used Arduino to decode", "description": "I. Introduction (5 minutes)\r\nA. Briefly introduce the topic and the speaker's personal journey\r\nB. Set the stage for an entertaining and educational adventure\r\n\r\nII. The Overheating Odyssey (5 minutes)\r\nA. Share the speaker's initial car troubles\r\nB. Describe the frustrating visits to multiple repair shops\r\nC. Tease the idea of taking matters into one's own hands\r\n\r\nIII. The Curious Curiosity (10 minutes)\r\nA. Introduce the OBD connector and its role\r\nB. Explain the decision to hack the car and the motivation behind it\r\nC. Highlight the essence of curiosity as the driving force\r\n\r\nIV. Electronics 101: A Crash Course (10 minutes)\r\nA. Provide a basic overview of electronics principles\r\nB. Explain the role of logic probes in analyzing data\r\nC. Prepare the audience for the upcoming hacking journey\r\n\r\nV. Hacking with Humor (15 minutes)\r\nA. Share funny and light-hearted misadventures during the hacking process\r\nB. Describe the experience of intercepting initial data on the car's CAN bus\r\nC. Explain the use of Arduino in decoding and translating signals\r\nD. Emphasize the importance of embracing humor and learning from mistakes\r\n\r\nVI. The World of Possibilities (10 minutes)\r\nA. Discuss the broader potential of car hacking\r\nB. Share a specific example of converting a gasoline car into an electric vehicle\r\nC. Inspire the audience to think creatively and explore new horizons\r\n\r\nVII. Conclusion (5 minutes)\r\nA. Summarize key takeaways from the talk\r\nB. Encourage the audience to embark on their own hacking adventures\r\nC. End on a light-hearted note, emphasizing the joy of curiosity and learning\r\n\r\nVIII. Q&A Session (15 minutes)\r\nA. Engage with the audience, answer questions, and share additional insights", "recording_license": "", "do_not_record": false, "persons": [{"code": "ZGGBB8", "name": "Rudi Grobler", "avatar": "https://pretalx.com/media/avatars/ZGGBB8_fcNAl8X.webp", "biography": "Seasoned (synonym for old) software engineer who has been developing software for diverse vertical markets for over two decades.\r\n\r\nHe has previously been recognized as a Microsoft MVP for his expertise in XAML-based products, including Windows Phone, WPF, and Silverlight.", "public_name": "Rudi Grobler", "guid": "daced38b-de51-5bff-9cb3-1ae3865eaea6", "url": "https://pretalx.com/bsides-joburg-2024/speaker/ZGGBB8/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/9KAXBT/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/9KAXBT/", "attachments": []}, {"guid": "fe70c6af-767a-5f3f-a747-cefe664ab0a0", "code": "AAGTQQ", "id": 51944, "logo": null, "date": "2024-07-20T17:15:00+02:00", "start": "17:15", "duration": "00:30", "room": "Track 1", "slug": "bsides-joburg-2024-51944-closing", "url": "https://pretalx.com/bsides-joburg-2024/talk/AAGTQQ/", "title": "Closing", "subtitle": "", "track": null, "type": "Event Session", "language": "en", "abstract": "Closing ceremony of BSides Joburg by organizing team", "description": "Closing of BSides Joburg by organizing team", "recording_license": "", "do_not_record": false, "persons": [], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/AAGTQQ/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/AAGTQQ/", "attachments": []}], "Track 2": [{"guid": "707a1ebc-60ab-516a-b240-e5909e3039b5", "code": "BNV9XG", "id": 51755, "logo": null, "date": "2024-07-20T10:30:00+02:00", "start": "10:30", "duration": "00:45", "room": "Track 2", "slug": "bsides-joburg-2024-51755-the-hidden-war-navigating-the-threats-of-corporate-espionage", "url": "https://pretalx.com/bsides-joburg-2024/talk/BNV9XG/", "title": "The Hidden War: Navigating the Threats of Corporate Espionage", "subtitle": "", "track": null, "type": "Standard Talk", "language": "en", "abstract": "Explore the hidden world of corporate and industrial espionage, where adversaries aim to steal trade secrets and intellectual property for competitive advantage. This presentation delves deep into the legalities, impacts, and methodologies of espionage activities, including the darker aspects, shedding light on the complex landscape while unraveling the mechanisms employed behind these covert operations.", "description": "The following are the main points that will be covered during the presentation:\r\n\r\nThe Landscape of Corporate Espionage:\r\n1. Differentiating between legal intelligence and illegal espionage.\r\n2. Exploring vulnerable industries with real-life cases such as Uber and the global electric car market.\r\n3. Assessing the value and risk of obtained information across sectors.\r\n\r\nThe Dark Sides: Methods of Espionage:\r\n1. Examining illicit methodologies including hacking, social engineering, and insider threats, along with real-life examples.\r\n2. Investigating potential involvement of ransomware groups, APTs, and nation-states in espionage for ransom or data brokering.\r\n3. Discussing the involvement of well-known forensic and private intelligence companies in the prevalence of spying and espionage.\r\n\r\nLegal and Ethical Considerations:\r\n1. Understanding legal frameworks distinguishing espionage from market research.\r\n2. Unveiling forensic approaches for identifying what constitutes intellectual property theft.\r\n3. Contemplating the necessity and implications of private intelligence units in organizations.\r\n4. Discussing strategies for effective and legal intelligence gathering.\r\n\r\nWeighing the Risks and Rewards:\r\n1. Analyzing benefits of legal intelligence gathering and risks associated with both legal and illegal espionage.\r\n\r\nCountering Espionage: Protecting Your Business:\r\n1. Discussing proactive measures to safeguard against espionage threats.", "recording_license": "", "do_not_record": false, "persons": [{"code": "3WQX7L", "name": "Kitso Moema", "avatar": "https://pretalx.com/media/avatars/3WQX7L_Pw6GCJh.webp", "biography": "Hi! I'm a certified Junior Penetration Tester and Digital Forensics Professional, currently working as a Cyber Security Consultant at Redshift Cyber Security. I have a keen passion for intelligence gathering, cybercrime investigations, and helping others navigate the ever-evolving cyber threat landscape. In my role, I get to actively hunt scammers, fraudsters, and other cyber criminals alike. Really cool stuff. My ultimate goal is to end up into a law enforcement role where I can continue to protect and secure the digital world.", "public_name": "Kitso Moema", "guid": "f72d4bac-b987-5a79-9024-6243ea94e605", "url": "https://pretalx.com/bsides-joburg-2024/speaker/3WQX7L/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/BNV9XG/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/BNV9XG/", "attachments": []}, {"guid": "c2f5d3aa-7295-5f32-8e0f-611369f62e34", "code": "WJA9K8", "id": 51738, "logo": null, "date": "2024-07-20T11:20:00+02:00", "start": "11:20", "duration": "00:45", "room": "Track 2", "slug": "bsides-joburg-2024-51738-the-evolution-revolution-of-cryptography-and-quantum-computing-in-cyber-security", "url": "https://pretalx.com/bsides-joburg-2024/talk/WJA9K8/", "title": "The evolution/revolution of Cryptography and Quantum Computing in\u00a0Cyber\u00a0Security", "subtitle": "", "track": null, "type": "Standard Talk", "language": "en", "abstract": "In this talk we provide a brief introduction to common cryptographic algorithms and weaknesses within their implementation. We show how quantum computing trivializes the exploitation of these weaknesses and how modern quantum resistant cryptographic algorithms seek to overcome these issues.", "description": "This talk covers the RSA and Elliptic curve cryptographic algorithms, their implementation and where they are used. Then we discuss common weakness that may occur during the implementation phase of these algorithms.\r\n\r\nWe present the basics of quantum computing and why it posses a risk to current asymmetric cryptographic keys. Shor's prime factorization algorithm will be explained with relevant examples to illustrate the factorization process. Then using Quantum Fourier Transforms we will show how quantum principles are used to reliably factorize large primes.\r\n\r\nWe conclude the talk with an overview of quantum resistant cryptographic algorithms and how quantum cryptography can be used to encrypt data in the future.", "recording_license": "", "do_not_record": false, "persons": [{"code": "ANGEA7", "name": "Ivan Burke", "avatar": "https://pretalx.com/media/avatars/ANGEA7_znebSgh.webp", "biography": "I have been a cyber security researcher for over 15 years. Mostly working with the CSIR and SANDF. For the last few years I have been working for BlueVision ITM as the head of Research, Development and Innovation. This has allowed me to build cyber security challenges for universities and to get involved with cyber security conferences such as BSides and 0xCon.", "public_name": "Ivan Burke", "guid": "efbdf41c-b5e8-557d-ad5e-ca9ea2e91b52", "url": "https://pretalx.com/bsides-joburg-2024/speaker/ANGEA7/"}, {"code": "3HZBWG", "name": "Sa'ad Kari", "avatar": "https://pretalx.com/media/avatars/3HZBWG_PKGlsGI.webp", "biography": "Sa'ad Kari, a Mathematician with a Bachelor's Degree in Physics & Mathematics, a Honours Degree in Mathematics and professional experience working as a cryptography developer. He is currently pursuing his Masters Degree with a strong focus on quantum-resistant cryptography.", "public_name": "Sa'ad Kari", "guid": "fe9873e2-99ae-5d5c-afd0-28a6bf5bf65e", "url": "https://pretalx.com/bsides-joburg-2024/speaker/3HZBWG/"}, {"code": "MRQWFC", "name": "Vimilan Naiker", "avatar": "https://pretalx.com/media/avatars/MRQWFC_LFxbbCi.webp", "biography": "TBD", "public_name": "Vimilan Naiker", "guid": "732aa6f6-21f9-582c-9688-290ed6d6e417", "url": "https://pretalx.com/bsides-joburg-2024/speaker/MRQWFC/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/WJA9K8/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/WJA9K8/", "attachments": []}, {"guid": "4d67d660-1ef0-5b48-8cd5-ebcf8082367b", "code": "KV7WZA", "id": 50349, "logo": null, "date": "2024-07-20T12:10:00+02:00", "start": "12:10", "duration": "00:45", "room": "Track 2", "slug": "bsides-joburg-2024-50349-reverse-shell-fallacy-an-introduction-into-defence-evasion-techniques", "url": "https://pretalx.com/bsides-joburg-2024/talk/KV7WZA/", "title": "Reverse-Shell Fallacy: An introduction into defence evasion techniques", "subtitle": "", "track": null, "type": "Standard Talk", "language": "en", "abstract": "The session will go over different techniques to bypass different types of defences you may encounter during engagements. We'll also do a brief discussion about the architecture, design, and flaws present in these defences, and why a successful reverse shell isn't always a measurement of success.", "description": "A brief overview of the topics:\r\nClassic vs Modern defences, a move towards detection engineering and threat hunting, individual offensive research vs multimillion-dollar research teams\r\n- Microsoft's attempts to aid in security\r\nDriver Signing Enforcement, Smartscreen, User Account Control, Protected Process Light, etc (They are trying their best.)\r\n- Talking about AMSI, AV, and EDR and touching on their Architecture, Design, and Bypass techniques, then going one step further to see what trails these attacks leave behind.", "recording_license": "", "do_not_record": false, "persons": [{"code": "T7CCQE", "name": "Gerhard Botha", "avatar": "https://pretalx.com/media/avatars/T7CCQE_6p7If6P.webp", "biography": "Always has time for a meme, but never has time for in-person interaction. I like spending weekends and free time building tools and researching malware.  Ask me to do a CTF and I will ask you if I can go home.", "public_name": "Gerhard Botha", "guid": "b7b3c33d-cc30-552f-ba44-3197fdc402a7", "url": "https://pretalx.com/bsides-joburg-2024/speaker/T7CCQE/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/KV7WZA/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/KV7WZA/", "attachments": []}, {"guid": "8805c705-6206-50d5-a756-a2561f1f728f", "code": "9HQGGW", "id": 51916, "logo": null, "date": "2024-07-20T13:45:00+02:00", "start": "13:45", "duration": "00:45", "room": "Track 2", "slug": "bsides-joburg-2024-51916-av-evasion-how-adversaries-aim-to-bypass-antivirus-tools", "url": "https://pretalx.com/bsides-joburg-2024/talk/9HQGGW/", "title": "AV Evasion - How Adversaries Aim to Bypass Antivirus Tools", "subtitle": "", "track": null, "type": "Standard Talk", "language": "en", "abstract": "Malicious actors continually refine their techniques to evade detection by antivirus (AV) software. In this session, we will delve into the sophisticated methods cybercriminals use to circumvent traditional AV defenses, showcasing the ongoing battle between attackers and defenders. This talk aims to provide a detailed understanding of contemporary AV evasion tactics and practical strategies for strengthening security postures against these advanced threats.", "description": "The ever-evolving nature of cyber threats requires continuous adaptation and innovation in defense strategies. By understanding and anticipating the tactics used by malicious actors to evade antivirus tools, security personnel can better protect their organizations against these sophisticated threats. Join this talk for an in-depth look at antivirus evasion techniques and discover how to fortify your defenses in an increasingly hostile cat-n-mouse cyber environment.\r\n\r\nKey highlights:\r\n\r\n\r\nUnderstanding Antivirus Mechanisms:\r\nThe talk will start by exploring how antivirus software operates, including signature-based detection, heuristic analysis, and behavioral monitoring. Understanding these mechanisms is crucial to comprehending how they can be circumvented.\r\n\r\nCommon Evasion Techniques:\r\nObfuscation\r\nPackers and Crypters\r\nFileless Malware\r\nLiving off the Land (LotL)\r\n\r\nAdvanced Techniques and Real-World Examples:\r\nReflective DLL Injection\r\nCommand and Control (C2) Evasion\r\n\r\nCase Studies + demo:\r\nThe talk will analyze recent high-profile attacks where AV evasion played a critical role. These case studies will illustrate the practical application of the techniques discussed and highlight lessons learned from these incidents. The demo will then show how legitimate software can be abused to evade AV.\r\n\r\nDefensive Strategies and Best Practices:\r\nFinally, there will be actionable recommendations for enhancing detection and response capabilities. This includes adopting advanced threat detection tools, employing behavioral analytics, and integrating threat intelligence to stay ahead of evolving evasion techniques.", "recording_license": "", "do_not_record": false, "persons": [{"code": "GYNGG7", "name": "Marvin Ngoma", "avatar": "https://pretalx.com/media/avatars/GYNGG7_CrABpCe.webp", "biography": "Marvin is a seasoned consultant and security architect. He has a strong passion for helping organizations succeed in their cybersecurity programs. He has led many projects in both the private and public sector, architecting and building Security Operations and Intelligence capability; unifying tools, processes and people.\r\n\r\nHe is currently based in the nordics and uses his expertise to help organizations throughout EMEA, on how best they can create security value in their organizations.", "public_name": "Marvin Ngoma", "guid": "b4b66cc0-04a5-5840-b18f-a7ce5599a215", "url": "https://pretalx.com/bsides-joburg-2024/speaker/GYNGG7/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/9HQGGW/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/9HQGGW/", "attachments": []}, {"guid": "9d422777-d0fe-5965-9487-4daff5f29c31", "code": "BPMDTW", "id": 48706, "logo": null, "date": "2024-07-20T14:40:00+02:00", "start": "14:40", "duration": "00:15", "room": "Track 2", "slug": "bsides-joburg-2024-48706-blindsqli-falls-on-deaf-ears", "url": "https://pretalx.com/bsides-joburg-2024/talk/BPMDTW/", "title": "BlindSQLi falls on deaf ears", "subtitle": "", "track": null, "type": "Lightning Talk", "language": "en", "abstract": "Explore the journey of discovering a blind SQL injection flaw, uncovering unforeseen access to sensitive data, and navigating the implications for cybersecurity practices. Gain insights into identifying, exploiting, and preventing such vulnerabilities.", "description": "This proposal presents a captivating narrative of a cybersecurity enthusiast's journey into uncovering a blind SQL injection vulnerability within a prominent electronics distributor's e-commerce platform. With meticulous detail, the speaker elucidates the techniques employed to identify and exploit this vulnerability, showcasing the potential ramifications it poses for website security. Attendees will glean actionable insights into bolstering their security practices through real-world examples and best practices.", "recording_license": "", "do_not_record": false, "persons": [{"code": "HAKKMH", "name": "Rohan Dayaram", "avatar": "https://pretalx.com/media/avatars/HAKKMH_HfC8TZy.webp", "biography": "21-year-old cybersecurity enthusiast interested in programming and hardware. I love writing code, 3d modelling and printing, electronics and anything else in tech. I have a deep passion for programming and hacking, I love learning about vulnerabilities and how to exploit them.", "public_name": "Rohan Dayaram", "guid": "2c9a4e18-dfc9-5aa2-a13b-555fa3c82f36", "url": "https://pretalx.com/bsides-joburg-2024/speaker/HAKKMH/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/BPMDTW/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/BPMDTW/", "attachments": []}, {"guid": "f949e780-0be6-5c70-bf12-95840d3fa583", "code": "3QBBEM", "id": 50579, "logo": "https://pretalx.com/media/bsides-joburg-2024/submissions/3QBBEM/d4e56c27-5799-424c-aa70-7452a7ae1252_vpzGgqw.jpeg", "date": "2024-07-20T14:55:00+02:00", "start": "14:55", "duration": "00:15", "room": "Track 2", "slug": "bsides-joburg-2024-50579-your-own-worst-enemy-beating-imposter-syndrome", "url": "https://pretalx.com/bsides-joburg-2024/talk/3QBBEM/", "title": "Your Own Worst Enemy - Beating Imposter Syndrome", "subtitle": "", "track": null, "type": "Lightning Talk", "language": "en", "abstract": "A lightning talk about Imposter Syndrome, and some techniques to overcome it.", "description": "I want to cover what imposter syndrome is, and some methods to overcome it, hoping to inspire and provide help to people coming to learn and get into Cybersecurity.", "recording_license": "", "do_not_record": false, "persons": [{"code": "MNNNNS", "name": "Roberto Arico", "avatar": "https://pretalx.com/media/avatars/MNNNNS_ZJis8NR.webp", "biography": "All round nice guy and BSides JHB & BSides Cape Town organiser. Keen interest in Cybersecurity and all things hacking.", "public_name": "Roberto Arico", "guid": "5ce7c84e-c2f9-565c-9f85-2f3a66fa2496", "url": "https://pretalx.com/bsides-joburg-2024/speaker/MNNNNS/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/3QBBEM/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/3QBBEM/", "attachments": []}, {"guid": "aaef52da-5357-5be6-8ca8-967a9568c6f7", "code": "SFNTMT", "id": 50557, "logo": null, "date": "2024-07-20T15:40:00+02:00", "start": "15:40", "duration": "00:45", "room": "Track 2", "slug": "bsides-joburg-2024-50557-developing-a-cybersecurity-framework-for-commercial-banks-in-south-africa", "url": "https://pretalx.com/bsides-joburg-2024/talk/SFNTMT/", "title": "Developing a cybersecurity framework for commercial banks in South Africa", "subtitle": "", "track": null, "type": "Standard Talk", "language": "en", "abstract": "The study proposed a conceptual framework for South African commercial banks as a direct response to the exponential rise of cyber-attacks and threats. It proposed this framework by identifying the factors impeding commercial banks from developing their own frameworks. The factors were identified using a mixed methods approach, with qualitative data collection facilitated through interviews and quantitative data collected by means of a survey distributed to IT, risk, compliance, and governance.", "description": "Cybersecurity has emerged as a significant concern for organisations and the Information Communication Technology (ICT) domain during recent decades. An increase in the number of cyber threats and cyber-attacks has been observed recently, and an even sharper increase was noticed during the worldwide coronavirus (COVID-19) pandemic outbreak. Simultaneously, the complexity of the cyber-attacks being executed by threat actors has increased, and the scope and geographical location of the targets of threat actors have also widened to include critical infrastructure in all corners of the world. Commercial banks in South Africa have not been spared. This is because financial institutions are seen as valuable targets by cybercriminals and communicators of advanced persistent threats (APT) due to the nature of their business and the vast amounts of data they store.\r\nThe study proposed a conceptual Cybersecurity Framework for Commercial Banks in South Africa. It proposed this by identifying the factors impeding commercial banks from developing their frameworks due to the challenges faced by the banks regarding cybersecurity from a South African perspective. The factors were identified using a mixed methods approach, with qualitative data collection facilitated through interviews with professionals within the banking domain in South Africa and quantitative data collected using a survey distributed to IT, risk, compliance, and governance professionals in commercial banks. The study identified seven factors contributing to establishing a cybersecurity framework for commercial banks. By addressing these factors, some of the challenges experienced by commercial banks regarding cybersecurity in the country can be addressed, which will improve the security posture of the organisations, internally and externally.\r\nThe study proposed that the stronger the coherence among the identified factors, the better commercial banks can defend themselves from cybercriminals. The findings further highlighted that for commercial banks to address the challenges posed by cybersecurity adequately, they would have to address cybersecurity holistically, placing equal emphasis on people, processes, and technology. They would also have to implement better security education, training, and awareness programmes for their employees and customers. In addition, commercial banks would have to bolster their capabilities for detecting and responding to cyber-attacks and collaborate more through establishing a national information sharing and analysis centre (ISAC). Furthermore, the study reinforced the need for commercial banks to invest in improving their cybersecurity detection, response, and remediation capabilities. Given the global shortage of skilled cybersecurity professionals, organisations should focus on developing talent internally through upskilling and breaking down barriers to entry into the cybersecurity domain.\r\n\r\nGiven the nature of cybersecurity and the sensitivity of the information associated with cybersecurity, the key limitation the researcher faced when conducting the study was a failure to obtain the necessary permissions to carry out the survey within the banks and to get first-hand accounts of previous incidents and how they were dealt with. During the study, it became evident that cybersecurity is a field that commercial banks and the South African government are still in the process of coming to grips with. Future research could investigate how well the cabinet's new laws and regulations have had the desired impact on cybercrimes and cyber threats within the country. Additionally, to gather a more comprehensive picture of the threats and patterns of bank attacks, further studies could focus on obtaining the necessary permissions and clearance to study cyber-attacks and threat actors within the banks. Due to its sensitivity, this will enable better data collection and access to information that is not publicly available. In addition, an investigation into how the frameworks within banks are developed to support cybersecurity may also be carried out.", "recording_license": "", "do_not_record": false, "persons": [{"code": "RB7HFD", "name": "Tlhologelo Mphahlele", "avatar": "https://pretalx.com/media/avatars/RB7HFD_SzHhDrK.webp", "biography": "Tlhologelo Mphahlele is a cybersecurity professional currently working within the cyber threat intelligence domain for one of the banks in South Africa, where he applies his knowledge and experience to safeguard financial infrastructure.\r\n\r\nWith a doctorate in Information Systems from University of the Western Cape and a Master's degree in Security and Network Engineering from Innopolis University in Russia, Dr. Mphahlele has a solid academic foundation in cybersecurity. His professional journey spans diverse sectors, including banking, telecommunications, and retail, where he has honed his skills and expertise in security practices and protocols.\r\n\r\nDr. Mphahlele is not only active in the corporate realm but also contributes to academia. He plays a vital role in shaping the next generation of cybersecurity professionals by contributing to content for one of South Africa's higher education providers in cybersecurity and network engineering modules.", "public_name": "Tlhologelo Mphahlele", "guid": "310d559d-319f-5523-97b9-1eb71d0b82f6", "url": "https://pretalx.com/bsides-joburg-2024/speaker/RB7HFD/"}], "links": [], "feedback_url": "https://pretalx.com/bsides-joburg-2024/talk/SFNTMT/feedback/", "origin_url": "https://pretalx.com/bsides-joburg-2024/talk/SFNTMT/", "attachments": []}]}}]}}}