Sched.com Conference Mobile Apps
Security BSides London 2014
has ended
Create Your Own Event
Security BSides London 2014
Security B-Sides London 2014
29th April 2014 (that’s a Tuesday)
Kensington and Chelsea Town Hall, Hornton Street, London, W8 7NX
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Exhibitors
Map
Search
or browse by date + venue
Keynote
All
Introduction
Keynote
Lightning Track
All
Panel
Talk
Rookie
All
Rookie Track
Track
All
Track 1
Track 2
Workshop
All
Workshop 1
Workshop 2
Workshop 3
Company
Keynote
Mentor
Rookie
Track 1
Track 2
Audience
Presentation
Talk
Welcome
Subject
Committee Room 2
Committee Room 3
Committee Room 4
Committee Room 5
Great Hall
Area
Any Geek
bring a laptop!
Business
Hackers
Management
PenTesters
Reg Ex for Red and Blue Teamers. Hands on experience
Techies
Popular
menu
Menu
Schedule
Speakers
Sponsors
Exhibitors
Map
Search
Popular Events
#1
Viruses! Malware! And threats! Oh my!
#2
Introduction to BSides London 2014
#3
Easy Way to Bypass Anti-Virus Systems
#4
Insecure out of the box: Leveraging Android manufacturer's mistakes to attack corporate networks
#5
LOL (Layers On Layers) - bypassing endpoint security for fun and profit
#6
Poor Man's Static Analysis
#7
A Day In The Life (Of A Security Researcher)
#8
Breaking Binary Protocols and Bad Crypto
#9
Tor: Attacks and Countermeasures
#10
Defensive Security Research is Sexy Too (& Real Sign of Skill)
#11
Privacy: State of the (performance) Art.
#12
RFID Hacking - An Introduction
#13
Continuous Security Testing in a Devops World
#14
CSRFT, A Toolkit for CSRF vulnerabilities
#15
Social Engineering | Phishing Stories
#16
Finux's Historical Tour of IDS Evasion, Insertions, and Other Oddities
#17
Honeywords: Detectable Password Theft
#18
Metasploit: You can look like Hugh Jackman too!
#19
Teaching Kids Programming and Cyber Security
#20
A Look at Modern Warfare
#21
Probe to Pwn
#22
Run-time tools to aid application security assessments
#23
Getting at serial consoles in embedded devices
#24
Top 10 Epic Fails in Identity
#25
When a noob becomes aware…
#26
Exploit Development - Abusing the Stack
#27
How Much Are You Worth
#28
A Multidisciplinary Perspective on Cybersecurity
#29
The Secret Life of iOS Apps
#30
Using Configuration Management to Pivot and Persist
#31
SIEM - Making the White Elephant Dance
#32
Is privacy still a thing?
#33
Zero-Day Surprises via your Supply Chain!!!
#34
Advanced Password Cracking
#35
Crawling Metadata with Recon-ng
#36
Nice, Nice, Baby - Moving on from Vanilla Testing
#37
The Joy of Passwords (with Sign Language)
#38
Foundational Packetry: Building packets with Scapy
#39
InfoSec is a Board responsibility
#40
Exploit Dev 101
#41
Extracting Configs From Common Remote Access Trojans
#42
Introducing Opabinia (SSLAuditor4)
#43
Death by Slide Deck
#44
Mobile Application Testing Consideration
#45
Why information security should be important to all of us
#46
Privacy Through Choice: Something for the Masses
#47
Practical Regular Expressions
#48
Copenhagen and Becks for Cybersecurity
#49
Lightning Talks
#50
Women in Security Panel
Popular by Type
All Types
Keynote
Lightning Track
Rookie
Track
Workshop
Popular by Day
All days
Tuesday, Apr 29