BSides Limburg

To see our schedule with full functionality, like timezone conversion and personal scheduling, please enable JavaScript and go here.
07:45
07:45
15min
Welcome
Main Stage
08:00
08:00
30min
Keynote (TBA)
Main Stage
08:30
08:30
60min
Bridging Clouds and Domains, Expanding Risks: An offensive and defensive journey across environments
Guillaume Bossiroy

Multi-cloud and hybrid identity setups are now the standard in enterprise environments. Connecting on-prem directories, cloud environments, and third-party systems improves management and visibility, enabling organizations to oversee their infrastructure more effectively. But in return, these connections blur long-standing trust boundaries and introduce new, often overlooked attack paths.

Speaking / Presentations
Main Stage
08:30
60min
I Know What You Did Last Summer: Lessons Learned from Privacy Breaches and Scandals
Kim Wuyts

The assume breach point of view has become the norm for security professionals, recognizing that incidents are bound to happen sooner or later. But what about breaches that go beyond the typical security threats exploited by malicious outsiders? In this talk, we will dive into privacy breaches, from major well-published scandals to smaller, barely mentioned cases, showing the impact of weak privacy design and how these breaches could have been avoided.

Through these high profile privacy incidents, we will derive actionable learning that you can integrate into your current security practices, ensuring your products will be both secure and privacy-respecting.

Speaking / Presentations
Breakout
09:30
09:30
30min
Coffee break
Main Stage
09:30
30min
Coffee Break
Breakout
10:00
10:00
30min
Hacking industrial environments and secure them safely
Photubias

This talk explores the world of OT or Operational Technology and, the risks when messing with them and how real and experienced pentesters can approach an OT pentest without increasing safety risks.

Be prepared to see a full live demo of an internet-to-production-disruption attack and how any company can defend itself against these threats. All without interrupting an always-on industrial environment.
We will also explain how one can defend itself to each of the different phases of these attacks.

Speaking / Presentations
Main Stage
10:00
30min
Threat modeling in practice
Koen Yskout, Stef Verreydt

Threat modeling: all development teams should be doing it, but what's really happening in practice?

Speaking / Presentations
Breakout
10:30
10:30
60min
Red is the new Blue
Vito Rallo

Nearly a decade of CREST’s influence has pushed the adoption of threat-informed security and helped miking the concept of “kill-chain” popular. MITRE contributed to systematically organize and document attacks across the kill-chain for strategic planning and atomic simulations are the tool to validate controls.

Still, many organizations struggle to prioritize available threat intelligence and turn simulation outcomes into actions. This gap underscores the need for a better Purple Team. One that doesn’t just produce a report, but actually helps improve defenses.

Purple Teams should be a downplayed “glorified” Red Team where the SOC knows that something is about to happen, learns about the attack technique and tries to catch it live. That’s not the point, nor it is running a series of planned and “continuously repeated” atomic tests; a BAS tool will produce “continuously the same results”. Purple Teams take a broader, more collaborative path aiming to cover a wider range of threats and focusing on strategic efficiency, producing artefacts that can be reinjected into operations for long-term value.

Speaking / Presentations
Breakout
11:30
11:30
60min
Lunch
Main Stage
11:30
30min
Lunch
Breakout
12:00
12:00
30min
Student Talk
Breakout
12:30
12:30
30min
All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship.
Ken Munro

Cruise ships are possibly the most complex collection of systems that you'll find in one physical, moving location. Propulsion, navigation, power generation and more, combined with a hotel, restaurant, casino, theatre etc, with safety and fire control systems to boot. That complexity creates huge challenges with keeping OT and IT systems apart. Ships engines are often remotely managed, network segregation is often defeated through troubleshooting when at sea.

We'll recount multiple entertaining and informative tales of taking control of ships, including accessing a ships Azipods via a game simulator for passengers. Fortunately, genuine attacks against vessels are very rare, but the effects and impacts to world trade are becoming increasingly obvious.

Speaking / Presentations
Main Stage
12:30
30min
From Node.js Malware on GitHub to Exposing Fake North Korean Companies
George Gerontakis

The open-source ecosystem is one of software’s greatest achievements but when trust is weaponized, the results can be alarming. In this session, we trace a case study that began with a seemingly innocent GitHub project and unraveled into a layered, globally-distributed deception network.

Speaking / Presentations
Breakout
14:00
14:00
30min
Pie Break
Main Stage
14:00
30min
Pie Break
Breakout
14:30
14:30
60min
Up and Down Technique: Exposing Hidden Data from RAG Systems
Pedro "drop" Paniago

After being presented at DEFCON 33 in the Bug Bounty Village and at leHack in Paris, this talk is now coming to the Belgian community. Pedro will be exposing a design flaw he discovered that impacts Retrieval-Augmented Generation (RAG) systems and AI-powered applications.

Speaking / Presentations
Main Stage
15:30
15:30
30min
Closing Note (TBA)
Main Stage
16:00
16:00
15min
Closing
Main Stage