Channel Avatar

BSides Bristol @UC6dLKcZ9on-EMva5G6q7HdQ@youtube.com

294 subscribers - no pronouns :c

More from this channel (soon)


16:50
Operationally Struggling Corporate Pentesters: Building Good Processes As A jr Tester - Nigel Ng
36:26
Ctrl+Alt+Defeat: Using Threat Intelligence To Navigate The Cyber Battlefield - Sophia McCall
18:10
Investigating Cyber Threats To Space Infrastructure - Jessie Hamill-Stewart
15:45
Managing Cyber Security Risk In Health Tech - Iryna Okhrymenko
18:33
Brexit To BSides: My Personal Journey Into Security - Jess Matthews
24:09
Passwordless Authentication Using Steganography, Cryptography And Biometrics - Tunde Oduguwa
37:38
Data, Agents And OSINT: You Don't Know What You Don't Know - Ryan Reeves & Zara Perumal
16:52
IPv6? I Thought We Only Used IPv4? - David Kennedy
40:39
Hacking Planes. What Can We Learn On The Ground From Vulnerabilities In The Air? - Ken Munro
25:10
Gone Phishing: Why Do We Take The Bait? - Rhiannon Fairweather & Raffi Rizzo
20:01
CTI; It's All About The Process... Or Probably Should Be !- Paul Miller
17:28
The QR Code Conundrum: Navigating Convenience And Cyber Security In The Post-COVID Era - Jack Wise
31:15
Once Upon A Flaw: 5 AppSec Stories, And What We Can Learn From Them - Paul Molin
32:46
Decoding Neurodiversity - Illyana Mullins
30:56
Understanding, Preventing, And Responding To Cyber Extortion - Victor Onyenagubom
27:58
9001 Ways To Break Out Of A Container - Josephine Pfeiffer
34:20
OfCORS! How To Do Cross Origin Resource Sharing (Im)Properly - Cory Turner
30:28
Navigating The SBOM Landscape: Formats, Relevance, And Tooling In 2024 - Viktor Petersson
36:06
The Numbers Game: Lies, Damn Lies, And Statistics - James Bore
45:19
Want To Speak At BSides? How To Write Your CfP - Illyana Mullins
30:34
The Perks Of NOT Being A Wallflower: Networking For Shy Folk - James Riley
35:33
Building The Future Of Cyber With Neurodiversity In Mind - Lucy Smith & Emily Chittell
32:40
@CrackingtheCode - Vihangi Vagal
15:11
The Prevenance Of PlugX And Hardening Against It - Will Bailey
35:00
Cybersecurity Lessons From Jurassic Park - Rohit Satpathy
23:18
Exploring Threat Hunting Practices And Challenges In Cyber Defense - Priyanka Badva
15:45
Using LLMs To Accelerate Threat Detection - Richard Finlay Tweed
38:50
Security Automation: Look At Your Vulnerabilities In The Eyes - Marine Du Mesnil
33:17
The Squid That Lost Its Shell - Simon Goldsmith & Christine Sharder
34:07
How To Make Cyber Security Everyone's Business - Andreea Mihai
36:04
Automating Detection And Response With Tines - Cameron Higgs & Pat Meehan
32:55
The Human Factor: Quantifying Human Risk - Sara Anstey
24:10
So You Wanna Be A Baiter. - Wayne May
33:51
XAI: Unmasking Cyber Threats Without Crying Wolf - Alsa Tibbit
36:50
Metrics That Matter: How To Choose Cloud Security KPIs For Your Business - Emma Yuan Fang
42:39
The Biggest Cons, And Why They Work - Sarah Armstrong-Smith
18:25
Is Your Voice Private? Security Concerns With Voice Assistants - Zafrin Malek Mithila
40:04
Growing Up Digital: Cyber Awareness For Today's Youth - Joe Wells
27:35
Everything Online Can Be Faked. Here's How - Wayne May
19:39
Not Another AI Talk - Sarah Connelly
31:58
Building Effective Vulnerability Risk Scoring Systems - Harri Renney
25:16
You're Gunna Need A Bigger Boat - Lisa Forte
21:30
Domain Name Stupidity - Liam Follin
33:51
Clash Of Cultures? Bringing Cybersecurity Into (Aero)space Safety - Emma Taylor
22:31
API Scraping For Swim & Profit - Melissa Augustine Goldsmith
32:54
Cognitive Defenders: How AI Transforms Cyber Security - Rosalind Grindrod
28:22
Securing AI - Seth
42:25
DevSecOps Leadership: Zero To Hero - Seb Coles
31:10
Current And Novel Methods Of Finding Exposed Cloud Assets - Shahnoor Kiani
40:05
Working Against The Clock: Cyber Security - The Infinite Game - Ryan Pullen
40:53
Making Consistent STRIDEs With Threat Modeling Templates - Andrea Jones
36:26
Securing Protocols With (Not So) Formal Methods - Jean Snyman
17:30
Portscanning with Powershell - James Conlan
41:26
How To Bypass Expensive Cyber Security Solutions: War Stories Of A Social Engineer - Chris Pritchard
41:34
How I Leant To Love My Superpower - Daniel Walters and Ben Docherty
29:37
Ghidra Vs The Cold War - Chris A
29:58
MITRE ATT&CK Framework For Threat Hunting - Seth Brunt and Abby Warnes
51:35
Spotting The Adversary Using The ATT&CK Matrix: A Practical Approach - Pete O
21:45
Making It Rain: Cryptojacking Attacks In The Cloud - Chris Doman
42:55
Reverse Engineering For Threat Intelligence - Vishal Thakur