1 minute read

ABOUTTHETALK SPEAKER BIO

Obfuscation is hard. But it doesn’t have to be boring!

Researchers face a number of issues when dealing with obfuscated data. But in Security we can flip the script and use these exact same problems against adversaries to uncover malware evasion techniques orpreventfraud.Examplecodeincluded.

Advertisement

John is currently Lead Data Scientist for Insider Threat at a global cybersecurity company. He looks for suspicious or weird patterns (like writing in the third person). Previous experience includes Head of Security Data Science in UK gov, similar in telecoms, network security analyst, and a Researcher of WiFi security where he picked up a PhD. Talk to me about any of the above, beer, books, games, or how great it is to have BSides Leedsback.

Links&Socials https://github.com/fauxnetic @fauxnetic

Aboutthetalk Speaker Bio

One of the most common questions that security practitioners are asked is ‘are we secure?’ It’s a difficult, maybe impossible question to answer. What does it mean to say that an organisation, or a person, is or is not secure? How secure is secure enough?

Socials&Links https://bores.com @coffee_fueled

James Bore has been the winner of the BestDressed in Security award for the latest 5 years (notarealaward)andhasbeenworkinginthefield for more years than he likes to think about. Over that time he’s worked with various companies, earned an MSc in Cyber Security, and been registered as a Chartered Security Professional. He’s proudest of his work teaching and training, including working with CAPSLOCK to help career changersintosecurityfindtheirplace. Nowadays he does various bits and pieces. These include running the family company Bores Group, making homebrew of questionable quality, speaking at conferences, and writing for various publications,aswellasspendingfartoomuchtime thinking about what things mean when he should beworking.

This article is from: