The London Briefing

Wednesday, October 16, 2019 09:00 - 20:00 London

Register your interest in attending our next Briefing. It’s taking place on Wednesday, October 16th at IET London: Savoy Place.

At this full-day event, you can expect:

  • Technical and business-related insights
  • Practical ‘how to’ tips
  • Guidance from cyber security experts
  • Insight into how companies predict, prevent, detect, and respond to cyber attacks
  • The opportunity to network with your peers and discuss with our consultants about your security concerns

Refreshments and lunch will be provided, and there will be a drinks reception after the event too.

There are limited spaces available - register below now to secure your place.

Register for a place at The London Briefing

We pride ourselves in being research-led and sharing our findings at our events. All the talks at our Briefing have one thing in common… helping you protect your organization from the most prevalent and advanced cyber threats.

Presentation topics:

Defending the cloud– Nick Jones and Alfie Champion


The traditional on-premise, corporate environment is a battlefield well-known to attackers and defenders alike, but 'cloud-first' digital transformations bring new threats, attack vectors, and risks. Though some existing security concepts translate to the cloud, a mindset shift is required to effectively detect and respond to attacks. 

This talk considers the fundamental differences between protecting cloud and on-premise environments, detailing the offensive techniques a motivated attacker will utilize to undermine your cloud security. We'll also give guidance on how to improve and continuously validate detection and response capabilities necessary to deliver resilient cloud environments. 

Faster, better, stronger, always [secure]: The future of MobSec - Owen Evans

Mobile app development has evolved from linear processes to more dynamic models delivering rapid and continuous deployments. Arguably the volume of application updates has rendered traditional security approaches infeasible, with testing unable to keep pace with releases. Security risks becoming an obstacle rather than an enabler. 

In this talk we’ll share an alternative approach which incorporates security into a development cycle, giving your organization the confidence to release by default, while establishing a continuous level of assurance across your entire application portfolio, past and present. 

A dragnet for your botnet – James Loureiro

There’s no denying botnets – networks of compromised computers – present a risk and a headache to businesses and the general public that has grown with the proliferation of connected devices. The question is, what can we do about them on a larger scale? In a world where we often focus on ourselves and our own organizations, the opportunity to develop solutions benefitting us all can pass us by. 

With defending society from cyber-attack being one of our main objectives, our Labs team has undertaken extensive research into botnets, leading to the development of a solution that tracks these devices and their infections, C2, and spam email activities across the globe, in real time. Our Associate Director of Research, James Loureiro, will explain what this means and how that information has allowed us to protect society as a whole. 

IR War Stories: Responding to Modern Threat Actors – Callum Roxan 

With the costs of breaches on the rise and ever-increasing prevalence of high impact security incidents across multiple industries; the effectiveness of an organizations response efforts has come more in to the spotlight. 

This talk will share experience from real cases against modern threat actors that the MWR Incident Response Team has conducted over the past few years. You’ll see how the attacks unfolded and how the decisions made during the response process directly affected the outcome of the incident. 

By the end of the talk, you’ll know how to better prepare your business to respond to incidents in the future and how to prepare for incidents before they occur.   

Phishing – now you’ve raised awareness, how do you reduce the risk? -  Riaan Naude

Nowadays many organizations run phishing exercises as part of their security programme, raising awareness of the social engineering technique in a bid to drive down click rates and increase reporting rates. Some characterize phishing as a ‘people problem’, focusing on individual susceptibility perhaps at the expense of other controls necessary to prevent, detect and respond to attacks. No wonder the technique remains effective, with Verizon reporting that phishing played a role in a third of all confirmed breaches last year. 

In this talk, we will explain how to step beyond raising awareness towards risk reduction. Adopting the attacker’s perspective allows organizations to identify the attacker actions that precede and follow user interaction, and ultimately develop a broader set of countermeasures that measurably reduce exposure. 

The notorious BigIp – Christoffer Jerkeby 

BigIP F5 products are used by large corporations and governments worldwide, but they’re not without vulnerabilities. Misinterpretations of dodekalogue - the rules that define TCL language interpretation - can leave it exposed, leaving organizations open to a significant level of compromise. 

In this talk, details of the flaws discovered by our security researcher, Christoffer Jerkeby, will be shared. Advice, guidance, and tooling will be given on how to identify vulnerabilities, qualify their exploitability and quantify the impact. And we’ll cover how to effectively remediate them too.  

There will also be an exclusive demonstration of the end-to-end attack chain that illustrates the devastating impact; if the vulnerabilities are leveraged by an attacker.  


What is the MWR Briefing?

MWR Briefings challenge perceptions and offer insights into the fast-paced arena of information security.


+ learn more

Home featured
Accreditations & Certificates

MWR is an accredited member of The Cyber Security Incident Response Scheme (CSIR) approved by CREST (Council of Registered Ethical Security Testers).
MWR is certified under the Cyber Incident Response (CIR) scheme to deal with sophisticated targeted attacks against networks of national significance.
We are certified to comply with ISO 9001 and 14001 in the UK, internationally accepted standards that outline how to put an effective quality and environmental management systems in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR is approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.
As members of CHECK we are measured against high standards set by NCSC for the services we provide to Her Majesty's Government.
MWR’s consultants hold Certified Simulated Attack Manager (CCSAM) and Certified Simulated Attack Specialist (CCSAS) qualifications and are authorized by CREST to perform STAR penetration testing services.