Sched.com Conference Mobile Apps
Security BSides London 2014
has ended
Create Your Own Event
Security BSides London 2014
Security B-Sides London 2014
29th April 2014 (that’s a Tuesday)
Kensington and Chelsea Town Hall, Hornton Street, London, W8 7NX
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Exhibitors
Map
Search
or browse by date + venue
Keynote
All
Introduction
Keynote
Lightning Track
All
Panel
Talk
Rookie
All
Rookie Track
Track
All
Track 1
Track 2
Workshop
All
Workshop 1
Workshop 2
Workshop 3
Company
Keynote
Mentor
Rookie
Track 1
Track 2
Audience
Presentation
Talk
Welcome
Subject
Committee Room 2
Committee Room 3
Committee Room 4
Committee Room 5
Great Hall
Area
Any Geek
bring a laptop!
Business
Hackers
Management
PenTesters
Reg Ex for Red and Blue Teamers. Hands on experience
Techies
Popular
Sign up
or
log in
to bookmark your favorites and sync them to your phone or calendar.
menu
Menu
Schedule
Speakers
Sponsors
Exhibitors
Map
Search
tune
Filter sessions
Simple
Expanded
Grid
By Venue
Tuesday
, April 29
Committee Room 2
11:00am •
How Much Are You Worth
LIMITED
11:15am •
Run-time tools to aid application security assessments
LIMITED
11:30am •
Copenhagen and Becks for Cybersecurity
LIMITED
11:45am •
A Look at Modern Warfare
LIMITED
12:00pm •
Introducing Opabinia (SSLAuditor4)
LIMITED
12:15pm •
When a noob becomes aware…
LIMITED
12:30pm •
Using Configuration Management to Pivot and Persist
LIMITED
12:45pm •
InfoSec is a Board responsibility
LIMITED
1:00pm •
Crawling Metadata with Recon-ng
LIMITED
2:00pm •
Game-Based CTFs - Engaging University Students in InfoSec
LIMITED
2:15pm •
Probe to Pwn
LIMITED
2:30pm •
Why information security should be important to all of us
LIMITED
2:45pm •
Zero-Day Surprises via your Supply Chain!!!
LIMITED
3:00pm •
SIEM - Making the White Elephant Dance
LIMITED
3:15pm •
Is privacy still a thing?
LIMITED
3:30pm •
A Multidisciplinary Perspective on Cybersecurity
LIMITED
4:00pm •
The Joy of Passwords (with Sign Language)
LIMITED
4:15pm •
RFID Hacking - An Introduction
LIMITED
4:30pm •
Privacy Through Choice: Something for the Masses
LIMITED
4:45pm •
CSP Analysis - Attacking XSS Mitigation
LIMITED
5:00pm •
The Secret Life of iOS Apps
LIMITED
5:15pm •
Social Engineering | Phishing Stories
LIMITED
5:30pm •
Teaching Kids Programming and Cyber Security
LIMITED
Committee Room 3
11:00am •
Foundational Packetry: Building packets with Scapy
LIMITED
2:00pm •
Nice, Nice, Baby - Moving on from Vanilla Testing
LIMITED
4:00pm •
Exploit Development - Abusing the Stack
LIMITED
5:00pm •
Getting at serial consoles in embedded devices
LIMITED
Committee Room 4
11:00am •
Practical Regular Expressions
LIMITED
2:00pm •
Death by Slide Deck
LIMITED
3:00pm •
Extracting Configs From Common Remote Access Trojans
LIMITED
4:00pm •
Metasploit: You can look like Hugh Jackman too!
LIMITED
5:00pm •
Connect Dradis to everything: API, universal file upload and Excel (!)
LIMITED
Committee Room 5
11:00am •
Mobile Application Testing Consideration
LIMITED
2:00pm •
Exploit Dev 101
LIMITED
4:00pm •
Advanced Password Cracking
LIMITED
Council Chamber
11:00am •
Lightning Talks
LIMITED
2:00pm •
Women in Security Panel
LIMITED
2:30pm •
Lightning Talks
LIMITED
Great Hall
9:45am •
Introduction to BSides London 2014
LIMITED
10:00am •
Viruses! Malware! And threats! Oh my!
LIMITED
11:00am •
Privacy: State of the (performance) Art.
LIMITED
12:00pm •
Insecure out of the box: Leveraging Android manufacturer's mistakes to attack corporate networks
LIMITED
12:45pm •
Poor Man's Static Analysis
LIMITED
2:00pm •
Easy Way to Bypass Anti-Virus Systems
LIMITED
2:45pm •
A Day In The Life (Of A Security Researcher)
LIMITED
4:15pm •
Breaking Binary Protocols and Bad Crypto
LIMITED
5:00pm •
Finux's Historical Tour of IDS Evasion, Insertions, and Other Oddities
LIMITED
Small Hall
11:00am •
LOL (Layers On Layers) - bypassing endpoint security for fun and profit
LIMITED
11:45am •
CSRFT, A Toolkit for CSRF vulnerabilities
LIMITED
12:30pm •
Honeywords: Detectable Password Theft
LIMITED
2:00pm •
Continuous Security Testing in a Devops World
LIMITED
3:00pm •
Tor: Attacks and Countermeasures
LIMITED
4:15pm •
Top 10 Epic Fails in Identity
LIMITED
5:00pm •
Defensive Security Research is Sexy Too (& Real Sign of Skill)
LIMITED
Timezone
Security BSides London 2014
Europe/London
Filter By Venue
The Town Hall, Hornton Street, London W8 7NX
Sort schedule by Venue
Committee Room 2
Committee Room 3
Committee Room 4
Committee Room 5
Council Chamber
Great Hall
Small Hall
Filter By Type
Keynote
All
Introduction
Keynote
Lightning Track
All
Panel
Talk
Rookie
All
Rookie Track
Track
All
Track 1
Track 2
Workshop
All
Workshop 1
Workshop 2
Workshop 3
Company
Keynote
Mentor
Rookie
Track 1
Track 2
Audience
Presentation
Talk
Welcome
Subject
Committee Room 2
Committee Room 3
Committee Room 4
Committee Room 5
Great Hall
Area
Any Geek
bring a laptop!
Business
Hackers
Management
PenTesters
Reg Ex for Red and Blue Teamers. Hands on experience
Techies
Filter sessions
Apply filters to sessions.
close
Dates
Tuesday
, April 29
Venue
Committee Room 2
Committee Room 3
Committee Room 4
Committee Room 5
Council Chamber
Great Hall
Small Hall
Session Type
Keynote
All
Introduction
Keynote
Lightning Track
All
Panel
Talk
Rookie
All
Rookie Track
Track
All
Track 1
Track 2
Workshop
All
Workshop 1
Workshop 2
Workshop 3
Other Filters
Company
Keynote
Mentor
Rookie
Track 1
Track 2
Audience
Presentation
Talk
Welcome
Subject
Committee Room 2
Committee Room 3
Committee Room 4
Committee Room 5
Great Hall
Area
Any Geek
bring a laptop!
Business
Hackers
Management
PenTesters
Reg Ex for Red and Blue Teamers. Hands on experience
Techies