Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
Past BSides Talks
Recorded sessions from BSides events worldwide. Filter by speaker, event, or year.
All chapters
▸ Advanced filters — narrow Technology by category
Filter by tool, framework, platform, etc. — each scoped to one category. All boxes intersect.
Most recent
Most popular
38:08
Unwanted Guests
David Brunsdon
BSides Vancouver Island
Open →
2026-05
43:58
Adventures in Edge Device Memory Forensics
Richard Tuffin
BSides Exeter
· 2026
Technical
DFIR
Hardware Security
Reverse Engineering
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2026-05
38:17
Vesta Admin Takeover — Exploiting Reduced Seed Entropy in Bash $RANDOM
Adrian Tiron
BSides Exeter
· 2026
Technical
Cryptography
Vulnerability Research
Web AppSec
Advanced
Red
Talk
Open →
2026-05
30:28
The Imposter Syndrome Security Gap - Illyana Mullins
Illyana Mullins
BSides Exeter
· 2026
Career
Community
Intro
Talk
Open →
2026-05
46:32
Life as a cyber security professional : advice from my former self - Paul Watts
Paul Watts
BSides Exeter
· 2026
Career
Career & Soft Skills
Talk
Open →
2026-05
38:23
Stopping account takeover at the recovery layer - Viola Lykova
Viola Lykova
BSides Exeter
· 2026
Technical
Web AppSec
Technical Deep-dives
Talk
Open →
2026-05
27:42
I Simulated Hacking a Car. Then I Tried to Defend It. Here's What Broke!
Rakesh Elamaran
BSides Exeter
· 2026
Research
Technical
Hardware Security
Vulnerability Research
Talk
Open →
2026-05
15:50
How to Land Your First Cyber Role: A DIY Approach
Gleb Tumanov
BSides Exeter
· 2026
Career
Career & Soft Skills
Intro
Talk
Open →
2026-05
39:07
Introduction to macOS Red Teaming in 2026
Matthew Lucas-Clarke
Victor van der Helm
BSides Exeter
· 2026
Technical
Intro
Red
Talk
Open →
2026-05
33:14
Your Browser is Snitching: Tracking Without Cookies
Adam Crease
BSides Exeter 2026
Technical
Privacy
Web AppSec
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2026-05
40:06
Shadow AI Is Your New Data Exfiltration Channel
Chijioke Okoye
BSides Exeter
· 2026
Technical
AI Security
Detection Engineering
GRC
Talk
Open →
2026-05
28:31
Autopwn or Auto Fail? The Truth About AI in Offensive Security
Dumisani Masimini
BSides Exeter
· 2026
Technical
AI Security
Vulnerability Research
Talk
Open →
2026-05
27:33
Buffer Overflows in the Era of Gen AI
Maxime Reynaud
BSides Exeter
· 2026
Research
AI Security
Vulnerability Research
Empirical Research
Technical Deep-dives
Talk
Open →
2026-05
40:38
Unlocking the Secrets of Stripped Go Binaries at Runtime
Alex M
BSides Exeter
· 2026
Technical
Malware Analysis
Reverse Engineering
Advanced
Red
Technical Deep-dives
Talk
Open →
2026-05
56:02
Cloud & Container Security: A Defensive Puzzle from Pipeline to SOC Operations
Ash Barker
BSides Exeter
· 2026
Technical
Cloud IAM
Container Security
Detection Engineering
Blue
Talk
Open →
2026-05
40:31
SOC: The Good, The Bad & The Ugly
Harish Kumar Gopalakrishnan
BSides Exeter
· 2026
War Stories
Career & Soft Skills
Detection Engineering
Blue
Talk
Open →
2026-05
17:28
From Kerry Katona to Pen Testing: Transferable Skills in Cybersecurity
Lisa Diaz
BSides Exeter
· 2026
Career
Career & Soft Skills
Intro
Talk
Open →
2026-05
22:37
Embedded Chromium Everywhere: A Security Look at MSEdgeWebView2 and CDP
Ben Mullan
BSides Exeter
· 2026
Technical
Reverse Engineering
Vulnerability Research
Web AppSec
Red
Technical Deep-dives
Talk
Open →
2026-05
23:57
The First Hour of Incident Response: Every Second Logs
George Chapman
BSides Exeter
· 2026
Technical
DFIR
Detection Engineering
Intermediary
Blue
Talk
Open →
2026-05
50:25
Stop Playing Security Whack-A-Mole
Lea Snyder
Mike Andrews
BSides Seattle 2026
Technical
Cloud IAM
DevSecOps
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2026-04
50:32
Waking Up to AI: An Adventure in Governance
Brian Myers
BSides Seattle 2026
Policy
AI Security
GRC
Supply Chain Security
Intro
Case Studies and Incidents Analysis
Talk
Open →
2026-04
26:40
Defending the Supply Chain: Building a Real-Time Package Firewall
Dale Bustad
BSides Seattle 2026
Technical
DevSecOps
Supply Chain Security
Intermediary
Blue
Talk
Open →
2026-04
28:14
Six Hundred Degrees of IAM Admin: Battles with a Cloud Conscious Adversary
Suril Desai
BSides Seattle 2026
Technical
Cloud IAM
Detection Engineering
Intermediary
Blue
Talk
Open →
2026-04
47:54
npm Account Takeovers: Preventing the next Shai-Hulud
Jen Gile
BSides Seattle 2026
Technical
Malware Analysis
Supply Chain Security
Threat Intel
Intermediary
Red
Case Studies and Incidents Analysis
Talk
Open →
2026-04
24:43
Building Real-Time AWS Guardrails: A Serverless, Homegrown Engineering Blueprint
Aleksei Denisov
BSides Seattle 2026
Technical
Cloud IAM
DevSecOps
Intermediary
Blue
Technical Deep-dives
Talk
Open →
2026-04
29:22
Identity Observability with Knowledge Graph: Beyond Monitoring to Enforcement
Chen Xi
BSides Seattle 2026
Technical
Cloud IAM
Detection Engineering
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2026-04
27:23
Security Awareness Training is Your Best Stealth Marketing Campaign
Ralph Heim
Liz Lewis-Lee
BSides Seattle
· 2026
Community
Career & Soft Skills
Intro
Talk
Open →
2026-04
25:36
You, me, and the HSM: E2EE's move to hardware
Eric Chiang
BSides Seattle 2026
Technical
Cryptography
Privacy
Talk
Open →
2026-04
50:29
MCP LFI in 60 minutes (or your money back)
Kurt Boberg
BSides Seattle
· 2026
Technical
Talk
Open →
2026-04
53:51
You Need Some Neurosparkle In Your Cybersecurity Team
Carson Zimmerman
Megan Roddie-Fonseca
BSides Seattle
· 2026
Career
Community
Career & Soft Skills
Talk
Open →
2026-04