This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Cambridge"

From OWASP
Jump to: navigation, search
m
 
(102 intermediate revisions by 3 users not shown)
Line 1: Line 1:
 
{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:[email protected] Adrian Winckles ]  and [mailto:[email protected] Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}
 
{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:[email protected] Adrian Winckles ]  and [mailto:[email protected] Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}
  
<paypal>Cambridge</paypal>
+
<b>Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!<br>  
<!-- first tab -->
 
= Local News =
 
==='''Local News'''===
 
'''Cambridge OWASP Chapter Meeting  - Mobile Forensics & Pen Testing'''
 
  
Tuesday 12th November 2013 17:00 – 20:00 (Anglia Ruskin University, East ROad, Cambridge LAB002/LAB006)
+
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]<br>
  
Hosted by the Department of Computing & Technology, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter and IEEE Industrial Electronics Chapter
+
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]<br>
  
'''Guest speaker(s):'''
+
</b>
  
'''Paul Cain:'''
+
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/<br>
Over 12 years experience working in the field of computer forensics.
 
Cutting the bytes within law enforcement more recently within a commercial environment. Conducting investigations on digital devices, providing witness evidence in court and author / teacher of the 7Safe forensic courses.
 
  
'''James Forshaw:'''
+
<meetup group="OWASP-Cambridge-Meetup" />
James is the Head of Vulnerability Research at Context Information Security in the UK. He has been involved with computer hardware and software security for over 10 years with a skill set which covers the bread and butter of the security industry such as application testing, through to more bespoke product assessment, vulnerability analysis and exploitation. He has numerous public vulnerabilities disclosures in many different products including web browser issues and virtual machine breakouts as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner.
 
  
He has spoken at a number of security conferences in the past, on a range of different topics such including managed language security at Blackhat USA, CanSecWest and Bluehat, Sony Playstation Portable hacking at Chaos Computer Congress, WebGL exploitation at Ruxcon and Citrix network exploitation at Blackhat Europe. He is also the developer of the free CANAPE networking analysis and exploitation tool.
 
  
----
 
  
 
'''Agenda'''
 
 
17:30 – 17:45 Welcome from the OWASP Cambridge Chapter Leader,  Adrian Winckles, Senior Lecturer in  Information Security, Anglia Ruskin University 
 
 
17:45 – 18:30 Paul Cain  (7Safe, PA Consulting) - Tracking Data using Forensics
 
 
18:30 – 19:15 James Forshaw (Context Information Security) - The Forger's Art: Exploiting XML Digital Signature Implementations
 
 
19:15 – 19:30 Q & A
 
 
19:30 – 20:00  Refreshments & Networking (coffee, tea, juice) in LAB006
 
 
----
 
 
'''Registration:'''
 
 
To register for this free event, please register online at
 
 
[http://www.surveymonkey.com/s/CQ9G6N7] Cambridge Chapter Registration
 
 
Please note there is no automatic notification or confirmation.
 
 
 
The conference will be held in the Lord Ashcroft Building, Room LAB002 (Breakout Room LAB006 for networking & refreshments).
 
 
Please enter through the Helmore Building and ask at reception.
 
 
Anglia Ruskin University
 
Cambridge Campus
 
East Road
 
Cambridge
 
CB1 1PT
 
 
Get further information on travelling to the university.
 
 
http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html
 
 
 
'''Meeting Location'''
 
 
Everyone is welcome to join us at our chapter meetings.
 
 
<!-- second tab -->
 
= Talks & Abstract =
 
==='''Next talks'''===
 
 
{|class="wikitable" border="1" |
 
|- valign="top" align="left"
 
! width="150" | Name
 
| Paul Cain
 
|- valign="top" align="left"
 
! Bio
 
| Over 12 years experience working in the field of computer forensics.
 
Cutting the bytes within law enforcement more recently within a commercial environment. Conducting investigations on digital devices, providing witness evidence in court and author / teacher of the 7Safe forensic courses.
 
|- valign="top" align="left"
 
! Title
 
| Tracking Data using Forensics
 
|- valign="top" align="left"
 
! Abstract
 
| IP data theft is becoming more common. Many data compromises are exploited from the internal threat. Using case studies this presentation will demonstrate forensic artefacts to provide some answers to how and what data was taken.
 
|-
 
|
 
|- valign="top"  align="left"
 
! Name
 
| James Forshaw
 
|- valign="top" align="left"
 
! Bio
 
| James is the Head of Vulnerability Research at Context Information Security in the UK. He has been involved with computer hardware and software security for over 10 years with a skill set which covers the bread and butter of the security industry such as application testing, through to more bespoke product assessment, vulnerability analysis and exploitation. He has numerous public vulnerabilities disclosures in many different products including web browser issues and virtual machine breakouts as well as being a Pwn2Own and Microsoft Mitigation Bypass bounty winner.
 
 
He has spoken at a number of security conferences in the past, on a range of different topics such including managed language security at Blackhat USA, CanSecWest and Bluehat, Sony Playstation Portable hacking at Chaos Computer Congress, WebGL exploitation at Ruxcon and Citrix network exploitation at Blackhat Europe. He is also the developer of the free CANAPE networking analysis and exploitation tool.
 
|- valign="top" align="left"
 
! Title
 
| The Forger's Art: Exploiting XML Digital Signature Implementations
 
|- valign="top" align="left"
 
! Abstract
 
| Many security critical systems rely on the correct implementation of the XML Digital Signature standard for the purposes of verification and identity management. Technologies such as SAML and Web Service Security use the standard, and its sibling XML Encryption, to manage the security of these technologies. Being a standard there is, unsurprisingly, no canonical implementation for any platform or language, with so many different developments there are likely to be differences in how the standard is interpreted.
 
 
While a fair amount research has been done into the effects of the standard such as it allowing signature wrapping attacks, these tend to be exposed due to poor usages of the XML Digital Signature libraries. Comparatively little research has been undertaken in the implementations themselves, how they diverge from the standard, how they ensure security and whether there are any vulnerabilities in the implementations themselves.
 
 
This presentation is about research done against the main open and closed source implementations of XML Digital Signatures, how they can be exploited to gain remote code execution, signature verification bypass or denial of service. It will show some of the more nasty vulnerabilities found during the research including a novel attack against the built-in Java and .NET libraries which allow for trivial signature spoofing exposing any user of those implementations into accepting an invalid signature which is independent of their usage.
 
|}
 
 
 
<!-- second tab -->
 
 
= Past Events =
 
= Past Events =
{|class="wikitable" border="1" style="text-align:center;"|
+
{| class="wikitable" style="text-align:center;" border="1" |
 
! width="300" | Date
 
! width="300" | Date
 
! width="350" | Name / Title
 
! width="350" | Name / Title
 
! width="300" | Link
 
! width="300" | Link
 +
|-
 +
|5 November 2019
 +
|Andrea Scaduto
 +
|[[Media:RTF-OWASP-Cambridge.pdf|presentation]]
 +
|
 +
|-
 +
|8 October 2019
 +
|Dinis Cruz - Revolut
 +
|[https://www.slideshare.net/DinisCruz/using-owasp-security-bot-osbot-to-make-fact-based-security-decisions Presentation]
 +
|
 +
|-
 +
|8 October 2019
 +
|Jeff Williams - Contrast Security
 +
|[https://contrastsecurity.app.box.com/s/w2pv7cb46r3guyob6i1xf0igne9g281g Presentation]
 +
|
 +
|-
 +
|14 May 2019
 +
|Aleksander Gorkowienko - ICS/SCADA Security
 +
|[https://spirent1-my.sharepoint.com/:b:/g/personal/aleksander_gorkowienko_spirent_com/EfDeMof_rydPsGBCGioPuBAB-7VpkIB4jGVtNv2vm8uUhQ?e=dA7hha presentation]
 +
|
 +
|-
 +
|14 May 2019
 +
|Andrew Baldwin - Cyber PREVENT
 +
|[[Media:Cyber_Prevent_for_OWASP_May_2019.pdf|presentation]]
 +
|
 +
|-
 +
|10 April 2019
 +
|Matthew Lorentzen - Sheepl
 +
|[[Media:OWASP-Sheepl_Presentation_April19.pdf|presentation]]
 +
|
 +
|-
 +
|12 March 2019
 +
|Jamie Roderick
 +
|
 +
|-
 +
|12 March 2019
 +
|Nour Fateen
 +
|[[Media:Nour_-_OWASP-3.pdf|presentation]]
 +
|
 +
|-
 +
|12 March 2019
 +
|Matthew Whitcombe
 +
|[[Media:MWR_-_OWASP_v6.pdf|presentation]]
 +
|
 +
|-
 +
|24 January 2019
 +
|Adrian Winckles
 +
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]
 +
|
 +
|-
 +
|24 January 2019
 +
|Simon Newman
 +
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]
 +
|
 +
|-
 +
|4 December 2018
 +
|Matthew Lorentzen
 +
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]
 +
|
 +
|-
 +
|4 December 2018
 +
|Etienne Greeff
 +
|[[Media:Seconds_out_2018_AI_&_ML_40_min_version.pdf|presentation]]
 +
|
 +
|-
 +
|6 November 2018
 +
|Adrian Winckles
 +
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]
 +
|
 +
|-
 +
|6 November 2018
 +
|Dr Grigorios Fragkos
 +
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]
 +
|
 +
|-
 +
|17 May 2018
 +
|Goher Mohammad
 +
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]
 +
|
 +
|-
 +
|13 March 2018
 +
|David Johannson
 +
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]
 +
|
 +
|-
 +
|13 March 2018
 +
|Rish Auckburally
 +
|[[Media:Intro to 3B RA V1.pdf|presentation]]
 +
|
 +
|-
 +
|18 January 2018
 +
|Deepinder Singh
 +
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]
 +
|
 +
|-
 +
|18 January 2018
 +
|Chris Woods
 +
|[[Media:Deck OWASP event 17-01.pptx|presentation]]
 +
|
 +
|-
 +
|18 January 2018
 +
|Nikola Milosevic
 +
|[[Media:OWASPCambridge.pptx|presentation]] ‎
 +
|
 +
|-
 +
|18 January 2018
 +
|Dr Ali Dehghantanha
 +
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎
 +
|
 +
|-
 +
|10 January 2018
 +
|Aleksander Gorkowienko
 +
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]
 +
|
 +
|-
 +
|5 December 2017
 +
|Deepinder Singh
 +
|
 +
|-
 +
|5 December 2017
 +
|Leum Dunn
 +
|[[Media:100 things.pdf|presentation]]
 +
|
 +
|-
 +
|7 November 2017
 +
|Dr Reza Alavi
 +
|[[Media:GDPR.pptx|presentation]]
 +
|-
 +
|11 October 2017
 +
|Dr Char Sample
 +
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]
 +
|-
 +
|11 October 2017
 +
|Dennis Ivory & Dr Diane Gan
 +
|[[Media:Anglia Ruskin F435.pptx|presentation]]
 +
|-
 +
|12 September 2017
 +
|John Fitzgerald - Secure Code Warrior
 +
|presentation
 +
|-
 +
| 4 April 2017
 +
| Leum Dunn - Redacted
 +
| [[Media:A day in the life of.pdf|presentation]]
 +
|--
 +
| 7 March 2017
 +
| Andrew Thompson - Checkmarx
 +
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]
 +
|--
 +
| 7 March 2017
 +
| John Haine IoT Security Foundation (Chair)
 +
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]
 +
|-
 +
| 25 Jan 2017
 +
| Nick Alston CBE / PIER Chair
 +
| [[Media:Cyber session.pptx|presentation]]
 +
|-
 +
| 25 Jan 2017
 +
| Mark Pearce/ 7Safe/PA Consulting
 +
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]
 +
|-
 +
| 25 Jan 2017
 +
| Martin Cassey / Nascenta
 +
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]
 +
|-
 +
| 25 Jan 2017
 +
| Paul Rowley FBCS / Havebury Housing Association
 +
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]
 +
|-
 +
| 25 Jan 2017
 +
| Laurence Kaleman / Legal Director, Olswang
 +
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]
 +
|-
 +
| 25 Jan 2017
 +
| Tony Drewitt / Head of Consultancy - IT Governance
 +
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]
 +
|-
 +
| 19 Jan 2017
 +
| Tony Drewitt / Head of Consultancy - IT Governance
 +
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]
 +
|-
 +
| 19 Jan 2017
 +
| Peter Yapp / NCSC Deputy Director - Incident Response
 +
| [[Media:NCSC slides.pdf|presentation]]
 +
|-
 +
| 19 Jan 2017
 +
| Martin Cassey / Nascenta
 +
| [[Media:Nascenta-IM-handout.pdf|presentation]]
 +
|-
 +
| 10 Nov 2016
 +
| Graham Rymer /  University of Cambridge
 +
|
 +
|-
 +
| 10 Nov 2016
 +
| Mark Wickenden
 +
|
 +
|-
 +
| 12 05 2016
 +
| Phil Cobley / Modern Policing & the Fight Against Cyber Crime
 +
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]
 +
|-
 +
| 12 05 2016
 +
| Jules Pagna Disso / Building a resilient ICS
 +
| [[MEdia:Building a resilient ICS.pdf|presentation]]
 +
|-
 +
| 08 03 2016
 +
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence
 +
|
 +
|-
 +
| 10 11 2015
 +
| Steve Lord / Trying (and failing) to secure the Internet of Things
 +
|
 +
|-
 +
|
 +
| John Mersh / Software and System Security: a life vest in the IoT ocean
 +
|
 +
|-
 +
| 10 Oct 2015
 +
| Sumit "sid" Siddharth / Some neat, new and ridiculous hacks from our vault
 +
|
 +
|-
 +
| 10 Feb 2015
 +
| Steven van der Baan / Web Application Security Testing with Burp Suite
 +
|
 +
|-
 +
|  2 December 2014
 +
| Colin Watson / OWASP Cornucopia
 +
|
 +
|-
 +
| 21 October 2014
 +
| Eireann Leverett
 +
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]
 +
|-
 +
| 1st April 2014
 +
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.
 +
|
 +
|-
 +
|
 +
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking
 +
|
 +
|-
 +
|
 +
| Damien King (KPMG) / Filename Enumeration with TildeTool
 +
|
 +
|-
 +
| 12th November 2013
 +
| Paul Cain / Tracking Data using Forensics
 +
|
 +
|-
 +
| 12th November 2013
 +
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations
 +
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]
 
|-  
 
|-  
 
| 5th March 2013
 
| 5th March 2013
Line 123: Line 280:
 
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]
 
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]
 
|}
 
|}
 
 
<!-- Don't remove this tag -->
 
<!-- Don't remove this tag -->
 
__NOTOC__  
 
__NOTOC__  
<headertabs/>
+
<headertabs></headertabs>

Latest revision as of 21:30, 13 November 2019

OWASP Cambridge

Welcome to the Cambridge chapter homepage. The chapter leaders are Adrian Winckles and Steven van der Baan.


Participation

OWASP Foundation (Overview Slides) is a professional association of global members and is open to anyone interested in learning more about software security. Local chapters are run independently and guided by the Chapter_Leader_Handbook. As a 501(c)(3) non-profit professional association your support and sponsorship of any meeting venue and/or refreshments is tax-deductible. Financial contributions should only be made online using the authorized online chapter donation button. To be a SPEAKER at ANY OWASP Chapter in the world simply review the speaker agreement and then contact the local chapter leader with details of what OWASP PROJECT, independent research or related software security topic you would like to present on.

Sponsorship/Membership

Btn donate SM.gif to this chapter or become a local chapter supporter. Or consider the value of Individual, Corporate, or Academic Supporter membership. Ready to become a member? Join Now BlueIcon.JPG


Join our MeetUp!

Follow us on Twitter

Talk to us on Slack

For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/

Chapter Meetings

Visit our group on meetup.com

Upcoming events

No events are scheduled at the moment.

Past events

  • Sep 26, 2023 (17:00): Adding SAST to CI/CD, Without Losing Any Friends, · , Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter, & BCS Cybercrime Forensics SG **Background** The **BCS – Chartered Institute for IT - Cybercrime Forensics Special Interest Group (SG)** promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professiona (read more)
  • Jul 6, 2023 (17:00): Operation Poppins: An immersive Interactive case study driven approach, · , Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter, & BCS Cybercrime Forensics SG/BCS Women & BCS Hampshire/Dorset branches **Background** The BCS – Chartered Institute for IT - Cybercrime Forensics Special Interest Group (SG) promotes Cybercrime Forensics and the use of Cybercrime Forens (read more)
  • Jun 6, 2023 (17:00): OWASP ZAP - An Introduction and Deeper Dive, · , Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter, & BCS Cybercrime Forensics SG **Background** The **BCS – Chartered Institute for IT - Cybercrime Forensics Special Interest Group (SG)** promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professiona (read more)
  • Apr 20, 2023 (17:00): What your Washing Machine says about you: Investigating unusual devices, · , Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter, & BCS Cybercrime Forensics SG/BCS Women & BCS Hampshire/Dorset branches **Background** The BCS – Chartered Institute for IT - Cybercrime Forensics Special Interest Group (SG) promotes Cybercrime Forensics and the use of Cybercrime Forens (read more)
  • Mar 23, 2023 (17:30): Can forensic processes thwart the use of portable programmable devices?, · , Hosted by the Cyber Security & Networking Research Group, Anglia Ruskin University, OWASP (Open Web Application Security Project) Cambridge Chapter, & BCS Cybercrime Forensics SG **Background** The BCS – Chartered Institute for IT - Cybercrime Forensics Special Interest Group (SG) promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professionals, (read more)
See all past events on meetup.com


Past Events

Date Name / Title Link
5 November 2019 Andrea Scaduto presentation
8 October 2019 Dinis Cruz - Revolut Presentation
8 October 2019 Jeff Williams - Contrast Security Presentation
14 May 2019 Aleksander Gorkowienko - ICS/SCADA Security presentation
14 May 2019 Andrew Baldwin - Cyber PREVENT presentation
10 April 2019 Matthew Lorentzen - Sheepl presentation
12 March 2019 Jamie Roderick
12 March 2019 Nour Fateen presentation
12 March 2019 Matthew Whitcombe presentation
24 January 2019 Adrian Winckles presentation
24 January 2019 Simon Newman presentation
4 December 2018 Matthew Lorentzen presentation
4 December 2018 Etienne Greeff presentation
6 November 2018 Adrian Winckles presentation
6 November 2018 Dr Grigorios Fragkos presentation
17 May 2018 Goher Mohammad Presentation
13 March 2018 David Johannson presentation
13 March 2018 Rish Auckburally presentation
18 January 2018 Deepinder Singh presentation
18 January 2018 Chris Woods presentation
18 January 2018 Nikola Milosevic presentation
18 January 2018 Dr Ali Dehghantanha presentation
10 January 2018 Aleksander Gorkowienko presentation
5 December 2017 Deepinder Singh
5 December 2017 Leum Dunn presentation
7 November 2017 Dr Reza Alavi presentation
11 October 2017 Dr Char Sample presentation
11 October 2017 Dennis Ivory & Dr Diane Gan presentation
12 September 2017 John Fitzgerald - Secure Code Warrior presentation
4 April 2017 Leum Dunn - Redacted presentation
7 March 2017 Andrew Thompson - Checkmarx presentation
7 March 2017 John Haine IoT Security Foundation (Chair) presentation
25 Jan 2017 Nick Alston CBE / PIER Chair presentation
25 Jan 2017 Mark Pearce/ 7Safe/PA Consulting presentation
25 Jan 2017 Martin Cassey / Nascenta presentation
25 Jan 2017 Paul Rowley FBCS / Havebury Housing Association presentation
25 Jan 2017 Laurence Kaleman / Legal Director, Olswang presentation
25 Jan 2017 Tony Drewitt / Head of Consultancy - IT Governance presentation
19 Jan 2017 Tony Drewitt / Head of Consultancy - IT Governance presentation
19 Jan 2017 Peter Yapp / NCSC Deputy Director - Incident Response presentation
19 Jan 2017 Martin Cassey / Nascenta presentation
10 Nov 2016 Graham Rymer / University of Cambridge
10 Nov 2016 Mark Wickenden
12 05 2016 Phil Cobley / Modern Policing & the Fight Against Cyber Crime presentation
12 05 2016 Jules Pagna Disso / Building a resilient ICS presentation
08 03 2016 Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence
10 11 2015 Steve Lord / Trying (and failing) to secure the Internet of Things
John Mersh / Software and System Security: a life vest in the IoT ocean
10 Oct 2015 Sumit "sid" Siddharth / Some neat, new and ridiculous hacks from our vault
10 Feb 2015 Steven van der Baan / Web Application Security Testing with Burp Suite
2 December 2014 Colin Watson / OWASP Cornucopia
21 October 2014 Eireann Leverett presentation
1st April 2014 Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.
Yiannis Chrysanthou (KPMG) / Modern Password Cracking
Damien King (KPMG) / Filename Enumeration with TildeTool
12th November 2013 Paul Cain / Tracking Data using Forensics
12th November 2013 James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations presentation
5th March 2013 Sarantis Makoudis / Android (in)Security presentation
5th March 2013 Nikhil Sreekumar / Power On, Powershell presentation