Sched.com Conference Mobile Apps
Security BSides London 2015
has ended
Create Your Own Event
Security BSides London 2015
Security B-Sides London 2015
3rd of June 2015
ILEC Conference Centre
47 Lillie Road, London, SW6 1UD
Schedule
Simple
Expanded
Grid
By Track
Speakers
Core Volunteers
Sponsors
Volunteers
Participants
Search
or browse by date + venue
Audience: Any Geek
Break
General Audience
Keynote
Presentation
Presentation (Not Filmed)
Rookie Talk
Workshop-Fun with Tools
Workshop-GeekFun
Workshop-The Career Path
Popular
menu
Menu
Schedule
Speakers
Core Volunteers
Sponsors
Volunteers
Participants
Search
Popular Events
#1
Introduction
#2
How I Rob Banks
#3
Virtual Terminals, POS Security and becoming a billionaire overnight!
#4
How Google turned me into my mother: the proxy paradox in security
#5
Closing Remarks
#6
E-banking transaction authorization – possible vulnerabilities, security verification and best practices for implementation
#7
Elliptic Curve Cryptography for those who are afraid of maths
#8
OpSec vs Attribution - the Hollywood view
#9
Introducing wifiphisher, a tool for automated WiFi phishing attacks
#10
T3W3-Windows Privilege Escalation
#11
Intelligence led Penetration Testing
#12
Proprietary network protocols - risky business on the wire.
#13
Crash all the Flying Things! - exploiting and defending aircraft collision avoidance
#14
Threat Intelligence a new approach for cyber security
#15
How Google turned me into my mother: the proxy paradox in security
#16
Hack the Hash
#17
T2W4-Myths about the HTTPS Lock - Building & Breaking PKI masterclass
#18
Power to the People: bringing infosec to the masses
#19
A Look at the Real Social Engineers
#20
Lunch
#21
Break
#22
Reversing for Fun: How to Pick a Victim
#23
DarkComet From Defense To Offense - Identify your Attacker
#24
T3W1-Return-Oriented Programming Primer
#25
Why bother assessing popular software?
#26
Standardisation in Penetration Testing and Vulnerability Assessment: Market Analysis and Recommendations
#27
Digital Forensics Investigations in the Cloud Environment
#28
Break
#29
Some hypotheses on well-being, burnout and stress related illnesses in the Cyber Security industry
#30
Blue Teamers: The Cinderella of Cyber?
#31
T2W2-Diving into Nessus reports for business level information
#32
Android App Inspection and Code Injection
#33
T3W2-Dradis Framework 3.0 - We are back!
#34
Encouraging Ethical Disclosure & Reporting
#35
ARMed ROPpery
#36
Updating the Future
#37
Emulating the Unknown
#38
T2W3-Maltego Magic - Creating transforms & other stuff
#39
T2W1-(Practical) Android Malware Analysis
#40
Monstrous Appetites: Where Our Security Eyes are Bigger than Our Stomachs
#41
Introduction
#42
T1W2-Pen Tester Interview Simulation
#43
T1W3-The Writey Writer's Guide to Writing Writerly
#44
Break
#45
T1W1-Breaking In to Pentesting: Student Edition
#46
Lunch
#47
Break
#48
Closing Remarks
#49
My love-hate affair with Security Operations
#50
talks will be populated on the day and listed here
Popular by Type
All Types
Audience: Any Geek
Break
General Audience
Keynote
Presentation
Presentation (Not Filmed)
Rookie Talk
Workshop-Fun with Tools
Workshop-GeekFun
Workshop-The Career Path
Popular by Day
All days
Wednesday, Jun 3
Recently Active Participants
Reed Loden
MF
Martin Forssén
S4
Sched 44CON
N
Nisar
Michael Macnair
E
Endless
Jonathan Sartin
Security B-Sides London
More →