Building an Effective Security Operations Centre by ECS – In meeting room 1 between 11am and 1pm. No specific knowledge or equipment required.
Keyboard Chaos by Commissum. In meeting room 2 11am to 12pm and 3pm to 4pm (separate sessions). Demo of hacking a Bluetooth keyboard. For techies only – bring your own laptop if you want to try it out for yourself.
Hacking the Internet of Things by PTP. In meeting room 1 2pm to 5pm. Useful kit would be Multimeters for buzzing out boards, USB to serial adapters (FTDI or otherwise), BusPirates, Logic Analysers (Saleae or clones), a laptop running Linux (VM or bare metal)
From Phish to Persist by SecureWorks. In meeting room 4/5 2pm to 5pm. This hands-on workshop will teach students how to chain several different tactics and techniques together to get in, and stay in, a target environment via phishing. Topics covered include Phishing-centric Intelligence Gathering, pretext development, payload customization, maintaining persistence, command/control and defence against this type of attacks. Attendees will need a reasonably powered laptop with a 64bit OS and VMWare Workstation. USB sticks will be provided to first 20 people, but best to bring your own in case these have all gone.
Understanding the pitfalls in the IT Risk management process by Neupart. In meeting room 4/5 11am to 12pm The workshop will go through a typical IT risk management process according to the ISO 27005 standard; how to carry out a business impact assessment; and more. The workshop will be most beneficial to those working in Information Security, IT Management, or similar fields.
Registration for workshops will be on the day at the front desk and will be clearly signposted. Places are limited and are strictly on a first come first served basis.