Tuesday, August 25, 2015 2 years ago ,
MWR is pleased to be sponsoring BSIDES Manchester 2015 and we will also be hosting the MWR after party this year!
As a company we invest heavily in knowledge sharing and believe that events such as BSIDES Manchester are invaluable to the community, providing a platform for discussion on the latest thinking and research in the InfoSec arena.
MWR is pleased to be sponsoring BSIDES Manchester 2015 and we will also be hosting the MWR after party this year! The after party will give you an opportunity to have a drink, have some food, relax and chat to other conference attendees. The venue has a maximum capacity of 270 people – so make sure you speak to the MWR crew from lunchtime onwards to collect your wristband! Wristband holders can join us at this exclusive after party from 6pm.
In 2014 BSides Manchester was born. It was the result of three Security Professionals based out of Manchester deciding that the UK needed more than just a single BSides event each year. After all the UK is one of the biggest Security Communities in the world and this should be celebrated and promoted.
Topic: Detect & Protect
Speaker: Luke Drakeford
Mobile payment applications contain sensitive user data and easily abused functionality, and all the while execute within environments which cannot be trusted.
This talk will explain the implications of running financial applications within such hostile environments, and demonstrate how an application can be reverse engineered and modified.
We will also discuss the implications of such an attack, including – targeted malware, the loss of confidence in the security of financial institutions, and the loss of intellectual property.
Topic: Journey into Hunting the Attackers
Speaker: Asif Matadar
An attacker can use a number of tools and techniques to retrieve credentials without triggering Antivirus programs, these include built-in Windows Operating System commands or popular attacker tools with the aim of being as stealthy as possible.
This talk will aid an Investigator to identify the artefacts on the file system and analyse memory dumps for malicious activity.
Topic: Who uses LOIC these days anyway?
Speaker: Matthew Watkins
Over the past 10 – 15 years, Distributed Denial of Service (DDoS) attacks have grown alongside the development of the internet. Today, DDoS attacks are a mainstream threat towards organizations and governments across the globe, highly influencing their design and operation. With an ever evolving world in which the Internet continues to become more and more prominent, and the Internet of Things threatening to take over the world, the landscape for potential DDoS attacks is growing larger by the day.
With the ability to knock major internet services offline, and even result in Internet slowdown, DDoS attacks are a commonly misunderstood yet highly effective form of cyber-attack. During this talk I will discuss the various categories of DDoS attack, outlining their characteristics, requirements and impact and also touch on the array of various defensive mechanisms that can be employed too.