The speaker’s profile picture
Abi

Researcher with a background in Theoretical Physics, currently researching Entanglement-Based Quantum Communication. Freelance graphic designer and artist.

  • Breaking the Unbreakable: Why Quantum Communication Isn't The Answer
The speaker’s profile picture
Adam Harrison

BSides Bristol director

  • Opening Words - Day 2
  • Closing Words - Day 2
  • Closing Words - Day 1
  • Opening Words - Day 1
The speaker’s profile picture
Andreea Mihai

As a security awareness professional, I am passionate about making security accessible to everyone by providing practical tools and customised approaches that enable secure online and offline behaviour.

  • Buffy vs. Phishing: Slaying Cyber Threats Sunnydale Style
The speaker’s profile picture
Awais Rashid

Awais Rashid is co-founder and director of Hacktonics Ltd, and lead architect and developer of LINICS. He is also Professor of Cyber Security at the University of Bristol. He has been involved in cyber security research and training for >30 years. He has led the development of multiple ICS testbeds, is Director of the EPSRC Centre for Doctoral Training focusing on cyber security of large-scale infrastructures and was the founder and director of the MSc in Cyber Security (Infrastructure Security) at University of Bristol. He has led many research programmes on ICS cyber security including a current programme on securing convergent ultra-large-scale infrastructures. He is also the editor-in-chief of the Cyber Security Body of Knowledge (CyBOK).

  • “Beware the Judderman my dear”: Lessons from building an open-source OT pentesting platform
The speaker’s profile picture
Benjamin

A recently graduated cybersecurity student from Warwick university (or at least I should be when you see this).

  • Using machine learning for risk analysis in RBAC for IOT applications
The speaker’s profile picture
Ben (@polygonben)

Ben is massive cyber-nerd, with a passion for creative defence-evasion techniques, reverse-engineering malware and fighting adversaries! He works at Huntress as a Security Operations Analyst. In his spare time you'll find him dissecting malware captured in his honeypots, pwning boxes and recording his solutions for his YouTube, or enjoying a pint in the pub.

  • Compromising Threat Actor Communications
The speaker’s profile picture
Bethan

After taking a 10 year career break to raise my children I needed to decide how to return to work and in what field. A news report about cyber security peaked my interest and I spent several years retraining and trying to enter the field of cyber security. My first role was as a Junior Threat Hunter which I thoroughly enjoyed but I grew an interest in Threat Intelligence and took the opportunity to move into this field where I am currently working as a Senior Threat Intelligence analyst.

  • Should we drop the ‘C’ from CTI?
The speaker’s profile picture
Bogdan Tiron

Bogdan Tiron is a seasoned security consultant with over 10 years of experience specializing in application security. He has a proven track record of enhancing security measures for leading organizations, including bet365, JPMorgan Bank, GFK, HSBC, Lloyds Bank, and WorldRemit. Throughout his career, Bogdan has held various roles, including application security consultant, pentester, security architect, and DevSecOps specialist. Four years ago, recognizing a gap in quality within the pentesting industry, he co-founded FORTBRIDGE, a cybersecurity consulting company that offers pentesting, phishing, and red-teaming services to clients seeking to enhance their security posture. Passionate about staying ahead of emerging threats, Bogdan is dedicated to fostering a culture of security within organizations and empowering teams to integrate security practices seamlessly into their workflows.

  • Examining Access Control Vulnerabilities in GraphQL - A Feeld Case Study
The speaker’s profile picture
Chris Pritchard

Chris has worked in a range of industries, most notable of which are Critical National Infrastructure (CNI), and leading edge design and manufacturing (Dyson). ​

Doing so has given Chris a very varied array of knowledge, from penetration testing robot vacuum cleaners, to designing and testing secure ICS/OT networks.​

During Chris’ time at Dyson, he was involved in developing the global security team and performing internal penetration testing. Chris was also heavily involved with securing the design of Dyson’s current and future internet connected appliances, and corresponding smartphone applications. ​

Chris is an Red Team Lead at Accenture which involves him acting and thinking like a genuine attacker to compromise client networks. ​

Chris’ skill set also includes Social Engineering, and he has successfully gained access into CNI, Airports and Casinos, which are regarded are some of the most secure facilities in the industry.​

Chris has been lucky enough to have spoken at DefCon twice (Social Engineering 101 & How to hack an oil rig) , and many different BSides across the country.

  • Level Up Your SE Game - An Intro to Basic Psychology
The speaker’s profile picture
Debi McCormack

My role at The Cyber Scheme involves raising awareness of our core NCSC-Assured training and assessment services, and Professional Registration of cyber security professionals, through relationship building, networking, public speaking, and communications. As early careers lead, I am also committed to supporting people into roles in offensive security by working on recruitment pathways, discussing the technical skills gap and helping our assessment candidates find employment. I am a regular public speaker on topics including neurodiversity in cyber, how to navigate a career in cyber and on topics such as managing CPD and maximising your professional journey.

  • Do you care about the professionalisation of our industry?
The speaker’s profile picture
Dumisani Masimini

Dumisani Masimini is a penetration tester and consultant at Pentest People, where he helps organisations understand and reduce their security risk through meaningful, action-focused assessments. With experience across internal infrastructure, web apps, and Active Directory environments, Dumisani is passionate about making technical findings accessible and impactful for every level of an organisation.

  • From Payloads to People: The Other Half of the Job
The speaker’s profile picture
Eloise Fitzmaurice

I am a Lead Cyber Security Consultant at Templar Executives, advising clients on how to improve their cyber maturity from a holistic standpoint - encompassing people, processes, technology and culture. I am passionate about empowering and upskilling generational groups on digital literacy and cyber skills, and I’ve been a volunteer for the not-for-profit Cyber Champions for over 10 years and a Director since 2024. Additionally, I am a ‘digital buddy’ volunteer for Age UK, to support senior citizens to confidently navigate the online world.

  • Bridging the cyber gap for all
The speaker’s profile picture
George Chapman

Cyber Security Consultant specialising in Red Teaming

  • The Psychology of Cyber - Navigating a Crisis Like a Pilot
The speaker’s profile picture
Harry Frankl

Harry is a security consultant with 3 years of experience. Prior to this, he did bug bounty, identifying impactful web vulnerabilities whilst self-teaching himself to become a penetration tester.

  • WordPress Plugin Code Review for Fun and Bounties
The speaker’s profile picture
Hazel McPherson

BSides Bristol director.

  • Opening Words - Day 2
  • Closing Words - Day 2
  • Closing Words - Day 1
  • Opening Words - Day 1
The speaker’s profile picture
Holly Foxcroft

Holly brings a powerful mix of strategic cyber‑security leadership and passionate advocacy for neurodiversity. In her current role as BISO at OneAdvanced, she shapes inclusive, resilient digital transformation across critical sectors  . Formerly Head of Neurodiversity in Cyber Research & Consulting, she has also held posts as Associate Lecturer in Cyber Security, UK Ambassador for responsible AI, and is an advisory board member of The Cyber Express.

Holly’s unique perspective stems from her time in the Royal Navy and her academic grounding in criminology, cybercrime, and social sciences. She’s consistently recognised among the UK’s Most Inspirational Women in Cyber, a testament to her drive to empower diverse talent and promote inclusion across the cyber-security landscape

  • Keynote - Day 2
The speaker’s profile picture
Iryna (Erin) Okhrymenko

Iryna (Erin) is a Product Manager who's passionate about making AI actually work for humans instead of against them. With a unique background spanning AI technologies, empathetic UX design, and cybersecurity Erin has spent her career figuring out why brilliant technology often fails spectacularly when it meets real human needs.
As a Lean Innovation Coach, Iryna mentors startups on turning innovative ideas into viable products that people actually want to use. She's also actively involved with the Cyber ASAP accelerator, where she helps academics bridge the gap between groundbreaking research and commercial reality. In addition, Iryna mentors emerging professionals in both cyber and AI bootcamps. Her passion for this intersection runs so deep that she's starting a PhD in AI for Customer Intelligence and Cybersecurity, because apparently solving one complex problem at a time isn't challenging enough.

  • Beyond Tech: Making Cyber More Emotionally Intelligent
The speaker’s profile picture
Jack W

I'm young in my industry and keen to learn. I'm a soc analyst who got their job as a result of Bsides Bristol 2023. Every day I learn new things and want to be the person who shares knowledge to the next batch of cyber security professionals. I'm love tech and an cyber security addict, I'm passionate about protecting people online and young persons cyber security education. I recently joined as a governor for cyber security at my childrens school furthering my strive for education. I recently furthered my career after speaking at Bsides 2024 and am continuously looking for ways to share my knowledge.

  • accept,mitigate,avoid cyber security in todays young people
The speaker’s profile picture
James John

James is a Chartered Incident Response Professional with extensive expertise in Digital Forensics and Incident Response (DFIR). Certified by SANS, he brings over nine years of specialised experience to the field, having conducted both criminal and civil forensic investigations across public and private sectors.
In his current role, James leads security operations and incident response investigations for Bridewell's diverse client portfolio. His expertise spans critical national infrastructure, finance, hospitality, and FinTech industries, serving clients throughout the UK and US.

  • Welcome to the ARK Side
The speaker’s profile picture
James Stevenson

James is a software engineer and security researcher, with a background of over eight years in the computer security industry - with a primary focus in offensive security, vulnerability research, and penetration testing. Alongside his career in offensive security, James also works on a PhD where he practices at the intersection of computer science/ machine learning and social science.

  • LLM Offensive Red-teaming and Exploitation (LORE) Village
  • LLM Offensive Red-teaming and Exploitation (LORE) Village
The speaker’s profile picture
Jeffrey Gaor

Jeffrey is a Vice President of Cybersecurity Assessment specializing in Offensive Security, with over a decade of experience in Penetration Testing, Vulnerability Management, Cyber Threat Intelligence, and Security Operations. He has led and delivered security assessments for businesses, enterprises, and government agencies, identifying and mitigating critical vulnerabilities across networks, Active Directory, web applications, APIs, wireless networks, and mobile platforms (iOS & Android).

As a recognized expert, Jeffrey actively participates in bug bounty programs and has been acknowledged by top organizations, including Apple, Oracle, Toyota, and Morgan Stanley. His research has contributed to the discovery of multiple vulnerabilities, earning him four CVE IDs.

In May 2024, he presented an API security tool at the Black Hat Arsenal in Singapore, showcasing an API scanning tool designed to enhance security and detect vulnerabilities in API applications.

Upcoming Talk for 2025:
https://www.rootcon.org/html/rc19/speakers#offlineisnewluxury

  • The Silent Data Breach: Unintended Exposure of Sensitive Information in Microsoft Enterprise Enrollment, Entra, and Intune
The speaker’s profile picture
Jemma Davis

Jemma Davis is the founder and CEO of Culture Gem, an award‑winning platform and consultancy reshaping cyber security culture through adaptive, people-first training. Her journey into cyber began when she organised a conference for over 200 CISOs during the WannaCry crisis, an experience that ignited her mission to make cyber learning inclusive, compelling, and behaviour-driven. She combines creative marketing, lived experience, and deep human insight to build safer digital workplaces.

  • Access Denied: Sausage Farmers, Nans, and Security’s People Problem
The speaker’s profile picture
Joe Gardiner

TBC

  • ICS / OT Village
  • ICS / OT Village
The speaker’s profile picture
Kai Harris

Kai is a tech-enthusiast, with a love for seeing LEDs blink in weird patterns.

He does not like it when an LED is SUPPOSED to be blinking, but is NOT!

He previously spoke at BSides London 2024, on the topic of "secure notebooks and memoryless peripherals" (video of talk), where he enjoyed an amazing introduction to both the Security community, and BSides team.

  • Think Like a Chip: Secure Design in the Digital Age
The speaker’s profile picture
Ken Munro

Ken Munro is Partner and Founder of Pen Test Partners, a firm of ethical hackers. He regularly blogs on everything from ICS issues in maritime security to hacking cars and the Internet of Things. This has led to regular appearances on TV and BBC News online as well as the broadsheet press.

Ken has become a voice for reform and legislative change, briefing UK and US government departments as well as being involved with various EU consumer councils. He has also spoken about ICS and IIoT security issues at various events including the Maritime Cyber Security Summit, and CMA Shipping.

He’s also not averse to getting deeply techie, regularly participating in hacking challenges and demos at RSA, Black Hat, 44CON, DEF CON and BSides amongst others. Ken is also a member of the CVE Board.

  • All at sea. Thought your OT / IT infrastructure was complex? Try doing it on a cruise ship.
The speaker’s profile picture
Lauren Palmer

Lauren is the Engineering Team Lead at Hexiosec, where she is responsible for a talented development team to solve real-world cyber security challenges. She is driven by a love for problem-solving and building practical solutions that make a tangible difference. Lauren holds an MEng in Electronic and Software Engineering, which fuels her passion for creating robust, efficient systems.

  • Attacker's Perspective: What Attack Surface Management Reveals About Your Organisation
The speaker’s profile picture
Lauren Wilson

Lauren is a Cybersecurity Leader with over a decade of experience in Cyber Defence, specialising in Incident Response, Crisis Leadership, and Strategic Capability Development. She has led Cyber Incident functions across Government and Critical National Infrastructure, navigating high-impact Incidents while driving long-term Maturity and Operational Resilience. Lauren bridges the gap between Technical Operations and Executives. Passionate about giving back to the industry, she mentors future Cyber talent and has delivered lectures at the University of Warwick.

  • From the War Room to the Boardroom: Evolving Incident Response into a Strategic Business Function
The speaker’s profile picture
Lucy Smith

Lucy is the founder of Inclusive Change, an award-winning organisation based in South Gloucestershire, near Bristol.

Fresh from training as a stand-up comedian, she blends education and entertainment to challenge assumptions and spark real change. Drawing on a career in law enforcement and intelligence, education and change management, Lucy brings sharp insight, wit, and practical expertise to her work.

She has become a leading voice on neurodiversity in the workplace, working with international clients across tech, cyber security, education, and the public sector to build inclusive cultures, reduce burnout, and unlock the full potential of diverse teams. Whether delivering keynote talks, training leaders, or supporting frontline staff, Lucy’s approach is rooted in lived experience, evidence, and real-world impact.

  • Red Flags or Reasonable Requests? Inclusive Risk Management in Cyber Teams
The speaker’s profile picture
Matthew Luen

Recent first-class Computer Science graduate and top of my class, skilled in engaging training and RFID 2FA research to reduce cyber risk.

  • Tag You're IT! - Exploring RFID Card Cloning
The speaker’s profile picture
Matt Mckenzie

Matt Mckenzie is a Senior OT Cyber Security Consultant with PA Consulting with experience supporting sectors such as Electricity, Chemicals and Oil and Gas to secure their operations and ensure the resiliency of their critical systems from cyber attack.

  • The Dangers of OT Malware - Hacking a Nuclear Power Station
The speaker’s profile picture
Meera Tamboli

Meera Tamboli is a cybersecurity professional specializing in Security Operations Center (SOC) and Incident Response. With 2+ years of hands-on experience in threat detection, analysis, and mitigation, she brings practical insights into how organisations can strengthen their cyber defenses through effective incident response strategies.
Beyond her technical expertise, Meera is a passionate speaker and mentor dedicated to empowering the next generation of security professionals. She actively contributes to the infosec community by delivering engaging, accessible training that bridges complex security concepts with real-world business impact.
Meera’s approach emphasizes collaboration, practical skills, and inclusivity, aligning with the values of BSides Bristol. Her workshops and talks focus on demystifying cybersecurity operations and helping diverse audiences build confidence in managing cyber risks.

  • Cybersecurity Monopoly: Spend Smart, Survive the Chaos
The speaker’s profile picture
Mike K

Mike is currently head of cybersecurity operations at Leonardo UK. He has an MSc in Cyber Security from the University if the West of England and is a military veteran of UK cyber operations. Mike has been building and experimenting with AL and ML models since 2017. He previously spoke at B Sides Cheltenham in 2024 on using agents AI to automate Security Operations. Outside of work and tech, he's a keen rock climbing and fell runner.

  • Peeling the Onion - Using ML to peek inside ToR and VPN traffic without decryption.
The speaker’s profile picture
Parameswaran
  • The Silent Data Breach: Unintended Exposure of Sensitive Information in Microsoft Enterprise Enrollment, Entra, and Intune
The speaker’s profile picture
Paula Popovici

Paula Popovici is a cybersecurity researcher, OSINT investigator, and digital threat analyst passionate about protecting vulnerable populations online. Currently working with HypaSec, she combines field research, technical analysis, and awareness training to expose overlooked threat surfaces, especially those involving children and families.

Ranked in the Top 1% on TryHackMe and certified in Security+, Network+, and CySA+, Paula has worked across IT support, threat analysis, and digital safety education.

  • Digital Breadcrumbs and Parental Blind Spots: OSINT Meets Online Child Safety
The speaker’s profile picture
Phoebe

Phoebe is a technology degree apprentice at PwC. Alongside her studies of computer science, she is Co-President of CyberWomen@Birmingham, a branch of CyberWomen Groups. Phoebe involves herself in CTFs and building challenges, such as at the CRESTCon Europe 2024 CTF.

Over the past year, she has begun speaking at conferences to inspire others entering the field. She also gets involved in events and competitions in the West Midlands and beyond, such as the UK Cyber Leaders Challenge, where her team finished in third place out of 65 participating teams.

  • Dangers of the Internet of Things in the home
The speaker’s profile picture
Prabhsimran

Prabhsimran Singh is a Offensive Security Analyst at BDO LLP UK, with deep expertise in red teaming, cloud security, and security automation. He has led threat simulations, CI/CD hardening, and cloud infrastructure defense across roles at IBM, Oportun, Finelabs, and Goaco. A CREST CRT and OSCP-certified professional, he actively contributes to open-source tooling, speaks at security events, and mentors aspiring professionals in offensive security.

  • Container internals and Privilege Escalation
The speaker’s profile picture
Qais Temeiza

Qais is an Information Security Engineer/Researcher with an MSc from the University of Birmingham. He has worked on securing various mobile financial apps from low-level attacks while also monitoring them in the wild and conducting threat hunting. Additionally, his experience includes getting involved in embedded devices' low-level security research and previously published research in top journals and conferences. Qais has also worked on deploying SIEM solutions for financial institutions to meet their regulatory requirements

  • Hands-On Workshop: Software-Based Exploitation of Embedded Devices
The speaker’s profile picture
Sadi Zane

Sadi Zane is a Senior Principal Red Team Consultant at Kroll, specialising in end-to-end red team engagements and advanced attack simulation exercises. With deep expertise in initial access techniques, Sadi focuses on uncovering stealthy and effective methods for breaching enterprise environments. He also brings significant experience in container and Kubernetes security, performing in-depth reviews of managed orchestration platforms including Amazon EKS, Azure AKS, and Google GKE.

  • Certified Evil - Abusing Third-Party Signatures for Stealth Access
The speaker’s profile picture
Sam Maesschalck

Sam Maesschalck is the Lead OT Cyber Security Engineer at Immersive, where he develops practical, hands-on, and strategic-level training in operational technology. He previously worked in the space sector, focusing on cybersecurity, and holds a PhD in honeypots for industrial control systems (ICS) security.

  • ICS / OT Village
  • ICS / OT Village
The speaker’s profile picture
Sidra M

Sidra is a cybersecurity and identity access management (IAM) professional with over a decade of experience leading global security transformation initiatives. As a former Cybersecurity Delivery Manager and business-facing Product Owner, she drove IAM and data protection portfolio across 33 international markets. Currently returning to the industry after a family career break, Sidra is passionate about inclusive hiring, coaching, and supporting professionals navigating career transitions. Outside work, she enjoys painting, exploring nature with her family, and keeping up with her spirited kitten, Leo.

  • Out of Office, Not Out of Skills: Returning to Cyber After a Career Break
The speaker’s profile picture
Smitha Bhabal

Smitha Bhabal is a passionate offensive security enthusiast and an undergrad cyber security student, constantly exploring the digital world’s vulnerabilities and mastering the art of ethical hacking.

  • Tag You're IT! - Exploring RFID Card Cloning
The speaker’s profile picture
Vijay Kumar

Dr Vijay Kumar is the Cyber Security Lead at the Cyber Innovation Hub, based at Cardiff University, where he oversees the development of cyber-physical testbeds and training programmes focused on Operational Technology (OT) and critical infrastructure.

Vijay holds a PhD in Smart Cities and the Internet of Things from the University of Bristol. His work bridges research, engineering, and education designing hands-on environments that bring realism to OT cybersecurity training. He is working towards collaborations with national infrastructure providers, law enforcement, and defence partners to create scenario-based learning that simulates real-world attacks and cascading system failures.

With a background that spans both technical implementation and strategic leadership, Vijay is passionate about building the UK’s OT cyber capability and making cybersecurity education more practical, inclusive, and future-ready.

  • ICS / OT Village
  • ICS / OT Village