Talks
| Talk Title | Talk Synopsis | Event | Slides | Recording | Comments |
|---|---|---|---|---|---|
| OWASP Mobile Top 10 (2014) | to do | to do | to do | to do | to do |
| 50 Million Downloads... and all I got was malware |
How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. | various conferences in different formats | to do | to do | to do |
| The Internet of (broken) things | This talk will focus on the internet of things, how we’re connecting everything to the internet now, because why not add a WiFi connection to your Fridge? And how security is unlikely to be a consideration when making these products. I’ll also talk about DefCon, as last year my company sent a team of us to DefCon 25 in Las Vegas, explaining what DefCon is, what happens there, and how we won the IoT Village 0-day contest and I’ll conclude with a live hacking demo. | OWASP Newcastle - 27/03/2018 | to do | not available | to do |
| Red Teaming a view from the field | A talk about what red teaming is, how it is different from a penetration test, and then we’ll reveal some hardware we use during red team engagements and some success stories. | OWASP Newcastle - 13/06/2019 | to do | not available | Presented with my colleague at the time Gavin Johnson-Lynn |
| What I learned from running a honeypot | Towards the end of 2019 I ran several honeypots for around a week. This talk aims to walk through how to set up your own, learning from my mistakes, and then examines the data about what attacks are really taking place. | OWASP Newcastle - 04/02/2020 | slides | None available | to do |
| Harassed by Hamas - Israel's Cyber War | This presentation examines (in my opinion) one of the most recently overused phrases in the media “cyber war”, and what it actually means in reality for us cyber security practitioners. We will start by examining warfare, and review previous nation states attacks that have crossed the boundary into offensive cyber operations. We will then focus on October 2023 and the tactics deployed by both Hamas and the IDF during the war, from a cyber perspective. To do this we will discuss reverse engineering malware samples, API security and DDoS attacks in detail. Lastly we will conclude by looking at what the future of cyber warfare looks like, and what we can do to best protect ourselves / our organisations in such events. | Various, ISC2, BSides, ISACA, OWASP | slides | BSides NCL | to do |
