Talks


Below you can find the details for all my previous presentations I have delivered.


Talk Title Talk Synopsis Event Slides Recording Comments
OWASP Mobile Top 10 (2014) to do to do to do to do to do
50 Million Downloads...
and all I got was malware
How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. various conferences in different formats to do to do to do
The Internet of (broken) things This talk will focus on the internet of things, how we’re connecting everything to the internet now, because why not add a WiFi connection to your Fridge? And how security is unlikely to be a consideration when making these products. I’ll also talk about DefCon, as last year my company sent a team of us to DefCon 25 in Las Vegas, explaining what DefCon is, what happens there, and how we won the IoT Village 0-day contest and I’ll conclude with a live hacking demo. OWASP Newcastle - 27/03/2018 to do not available to do
Red Teaming a view from the field A talk about what red teaming is, how it is different from a penetration test, and then we’ll reveal some hardware we use during red team engagements and some success stories. OWASP Newcastle - 13/06/2019 to do not available Presented with my colleague at the time Gavin Johnson-Lynn
What I learned from running a honeypot Towards the end of 2019 I ran several honeypots for around a week. This talk aims to walk through how to set up your own, learning from my mistakes, and then examines the data about what attacks are really taking place. OWASP Newcastle - 04/02/2020 slides None available to do
Harassed by Hamas - Israel's Cyber War This presentation examines (in my opinion) one of the most recently overused phrases in the media “cyber war”, and what it actually means in reality for us cyber security practitioners. We will start by examining warfare, and review previous nation states attacks that have crossed the boundary into offensive cyber operations. We will then focus on October 2023 and the tactics deployed by both Hamas and the IDF during the war, from a cyber perspective. To do this we will discuss reverse engineering malware samples, API security and DDoS attacks in detail. Lastly we will conclude by looking at what the future of cyber warfare looks like, and what we can do to best protect ourselves / our organisations in such events. Various, ISC2, BSides, ISACA, OWASP slides BSides NCL to do