<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.cybertraining.uk/blogs/tag/conference-report/feed" rel="self" type="application/rss+xml"/><title>ID Cyber Solutions - Blog #conference report</title><description>ID Cyber Solutions - Blog #conference report</description><link>https://www.cybertraining.uk/blogs/tag/conference-report</link><lastBuildDate>Thu, 30 Apr 2026 10:04:07 +0200</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[ID Cyber Solutions Conference Report—SteelCon 2024]]></title><link>https://www.cybertraining.uk/blogs/post/steelcon-2024</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cybertraining.uk/Untitled-design.png"/>Attending conferences is a crucial way our staff can keep up to date with cutting-edge research, be introduced to important new ideas and perspectives ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_O4rrTKgnp95lgPoP-fmNcg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_HFAuDaAjNfo8I4VBQMNcsg" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_lO0ZSSREDP0P1snwoOSM9Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_iQHefwE6wkNaAYPuziRR3Q" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_iQHefwE6wkNaAYPuziRR3Q"] .zpimage-container figure img { width: 540px ; height: 261.55px ; } } @media (max-width: 767px) { [data-element-id="elm_iQHefwE6wkNaAYPuziRR3Q"] .zpimage-container figure img { width:415px ; height:283.04px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Untitled-design.png" width="415" height="283.04" loading="lazy" size="fit"/></picture></span></figure></div>
</div></div><div data-element-id="elm_QeJCvEFKoq3RJfujaF40_g" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ivXAdCYlRA3aOzza3pdbAA" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h1 style="font-size:24px;">ID Cyber Solutions Conference Report—SteelCon 2024</h1></div></h2></div>
<div data-element-id="elm_zEWawb46FboVMpj62ylbtw" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p><em>Attending conferences is a crucial way our staff can keep up to date with cutting-edge research, be introduced to important new ideas and perspectives, and help inspire and support the next generation of cyber security professionals. Our&nbsp;<a href="https://idcybersolutions.com/" target="_blank" rel="noreferrer noopener">ID Cyber Solutions</a>&nbsp;Conference Report series aims to showcase some exciting and ground breaking ideas presented at these events.</em></p><p><strong>Report by Alice McGready, Cyber Essentials Assessor and Technical Editor</strong></p></div></div>
</div></div></div></div></div><div data-element-id="elm_WBKviZjlQim85A2FMwuf1g" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_BVX1SG0BSzyElEP-_cVIJw" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_q1mjWXbGRcOtpbkCZPyUMQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_YefRvWQeSJG18jRiHokAHA" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;">July has always stood out for me in the cyber security conference year, because it’s when SteelCon—one of the events that really helped me decide to move into the industry—is held.<br></p><p style="text-align:left;">This year, it took place from July 19<sup>th</sup> ‘til July 21<sup>st</sup>, with the main event taking place on Saturday 20<sup>th</sup>. We travelled down to Sheffield on the Friday (grimacing slightly at the traffic but enjoying the sunshine) and arrived in time for networking at a nearby pub, taking the opportunity to meet others in the industry and catch up with those we hadn’t seen since the previous event.</p><p style="text-align:left;">On Saturday morning, we arrived at Sheffield Hallam University and were quickly greeted by… a couple of hundred people carrying board games and wearing &nbsp;’80s wigs? After some mild bemusement and presenting our QR codes to the registration desk, we likewise joined the board game-carrying, wig-wearing crowd and started digging through the conference swag bag: cassette tapes and sweat bands alongside the usual programme and snacks. Confirmed: the theme of this year’s conference was the 1980s.</p><p style="text-align:left;">Another general theme at SteelCon, as at many other cyber security events, is that of community and charity. This theme would be present throughout the day with the sticker stall and auction, which would be raising money for The Children’s Hospital Charity.</p><p style="text-align:left;">The board games, prominent because their bulk meant they didn’t fit in the swag bags, were part of an awesome SteelCon initiative that they also pursued in 2023 (I’m not sure if longer-standing). In 2023, the organisers went to a local charity shop and asked for 400 random books, which were then distributed to attendees. And when I say random, I mean I know of attendees who received a book on theoretical models in nursing, a book on Martin Luther, a crime novel, a book on baby-led weaning, a school study guide, etc. Attendees were encouraged to chat with fellow attendees, compare the books they’d received, and negotiate swaps if they so desired. Any unwanted books were returned to the organisers and donated back to the charity shop so they could sell them for a second time. The same applied this year to the games, which is why I started out with a card game and left with Kerplunk.</p><p style="text-align:left;">After the opening remarks, I spent a little time exploring the sponsor stands before making my way to ‘Social Engineering 101—Part Deux’ by <strong>Chris Pritchard</strong>. This was a direct follow-up to a talk he’d given at SteelCon in 2018, though I didn’t see this at the time; my first SteelCon was 2022, when I saw Chris highlight the social engineering tactics used as suspected Mossad agents infiltrated a hotel room. Based on how much I’d enjoyed that talk, I knew this would be good!</p><figure class="wp-block-image aligncenter size-large"><div style="text-align:left;"><img src="https://cybertraining.uk/wp-content/uploads/2024/08/SteelCon-Chris-1024x768.jpg" alt="" class="wp-image-9188"></div><figcaption class="wp-element-caption"><em>Chris Pritchard, SteelCon 2024</em></figcaption></figure><p>Early on, Chris introduced Miller’s Law, which essentially says that the average human can maintain seven (plus or minus two) pieces of short-term information, and pointed out that this is really helpful on social engineering engagements. As an example, he described how he’d noticed the style at a particular company was for employees to load up their badges with trinkets (e.g., USB sticks, tokens); when creating his fake badge, he therefore prioritised the trinkets, knowing that Miller’s Law would mean they would be the focus during security checks. He showed us a photo of the resulting badge, laden with trinkets, that led to a successful infiltration: the badge itself was entirely blank.</p><p>Chris also gave some general insights on successful badge creation, keeping Miller’s Law in mind, highlighting how sometimes people take photos of their badges on their last day at a company—‘just handing this in!’—and post on LinkedIn, meaning an easy overview of the company’s badge design, and how marketing teams often publish colours with the exact hex/RGB on the company website.</p><p>After some more insights and stories about social engineering engagements, he summarised that these skills aren’t natural but are learnable, social engineers need to present a state of confidence, and they should always be prepared for surprises. It was certainly no surprise to me that I thoroughly enjoyed this talk, both the content and Chris’s entertaining presentation style!</p><p>The next talk I attended was ‘The Code Compilation Process’ by <strong>Tom Blue</strong>. I’ve known Tom personally for a while but hadn’t seen any of his presentations until now—I was delighted to discover that his infectious passion shines through in his talks. This talk presented an overview of the code compiler pipeline, from lexing through to code generation, and, as an inexperienced coder, I will readily admit that I came into this talk purely intending to support a friend but instead I very quickly realised I was getting a lot out of it.</p><figure class="wp-block-image aligncenter size-large"><img src="https://cybertraining.uk/wp-content/uploads/2024/08/SteelCon-Tom-1024x768.jpg" alt="" class="wp-image-9189"><figcaption class="wp-element-caption"><em>Tom Blue, SteelCon 2024</em></figcaption></figure><p>Not only did Tom break down the compiler steps in a very clear and understandable way, but since “parsing applies to natural language too,” he also drew attention to the connections between code compilation and grammar—an obvious attraction for this ex-linguist! It really helped me gain deeper understanding from his presentation overall. Finally, he covered some security aspects relating to compilers, including how malicious modifications can easily propagate and benign code can be made malicious through a compiler. I genuinely learned a lot from this talk, thank you Tom!</p><p>Next up was an absolutely fantastic talk by <strong>James Bore</strong> on ‘Doing Due Diligence’. This is currently embargoed and we were asked not to publicise the content, but I heartily recommend checking it out when the recording is eventually released. I’ve seen James speak several times now—the quality is always top-notch but this was, in my opinion, one of his best.</p><p>Because of the embargo, the only photo I took was of Steve who was working AV for this session.</p><figure class="wp-block-image aligncenter size-large"><img src="https://cybertraining.uk/wp-content/uploads/2024/08/Steve-SteelCon2-1024x727.jpg" alt="" class="wp-image-9187"><figcaption class="wp-element-caption"><em>My ID Cyber colleague Steve working AV, SteelCon 2024</em></figcaption></figure><p>The final talk I saw was by <strong>Maya Boeckh</strong>: ‘post-startup (security) growing pains: “Hi, It’s me, I’m the risk”’. I’ve seen Maya speak before but on very different topics, with their SteelCon 2023 talk focusing on a language based on JavaScript that uses only six characters. The real similarity between all of Maya’s talks is that they only talk about things that they have a real genuine passion and interest in, and this one was no different.</p><p>This talk drew on Maya’s comprehensive experience of working in and with start-ups to offer insights on security aspects that are commonly deprioritised in the early stages of building a business, and the challenges surrounding these. For example, they spoke about start-ups where staff end up using their own devices which are not managed or overseen by the company at all, and the resulting issues this can cause. Unfortunately this talk had to start late due to some technical issues, which meant there was no time for a Q&amp;A before everyone made their way to the conference closing remarks—I think there could have been a very worthwhile discussion had there been more time!</p><figure class="wp-block-image aligncenter size-large is-resized"><img src="https://cybertraining.uk/wp-content/uploads/2024/08/SteelCon-Maya-768x1024.jpg" alt="" class="wp-image-9190" style="width:653px;height:auto;"><figcaption class="wp-element-caption"><em>Maya Boeckh, SteelCon 2024</em></figcaption></figure><p>At the conference closing remarks, most of the attendees (myself included) had removed their ’80s wigs due to the heat but the charitable nature of the event continued, with the announcement that almost £1,500 had been raised for the organisation’s chosen charity, The Children’s Hospital Charity. It was a fitting way to end such a community-focused conference.</p><p style="text-align:left;">Although there was an afterparty, we left after the closing remarks to make the trip back up to Glasgow (through wind and rain this time, rather than the glorious sunshine of Friday’s journey south!). Many thanks to the organisers, speakers, volunteers, and sponsors—I’m very much looking forward to next year!<br></p></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 14 Aug 2024 13:11:51 +0000</pubDate></item><item><title><![CDATA[ID Cyber Solutions Conference Report—9th INTERPOL Digital Forensics Expert Group (DFEG)]]></title><link>https://www.cybertraining.uk/blogs/post/interpol-digital-forensics-dfeg2024</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cybertraining.uk/Screenshot-2024-06-27-100730.png"/>Attending conferences is a crucial way our staff can keep up to date with cutting-edge research, be introduced to important new ideas and perspectives ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_zT2Xib-jo2HyvoV5p_jncA" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_E5ii4UiUzQP46HhhsGWqaQ" data-element-type="row" class="zprow zprow-container zpalign-items-flex-start zpjustify-content-flex-start zpdefault-section zpdefault-section-bg " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_NH9wO7iHjvrnHEhV84xYFQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_iVkUlw9NwdlH-S21vfEtLA" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_iVkUlw9NwdlH-S21vfEtLA"] .zpimage-container figure img { width: 1110px ; height: 331.61px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit hb-lightbox " data-lightbox-options="
                type:fullscreen,
                theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Screenshot-2024-06-27-100730.png" size="fit" data-lightbox="true"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_-6WrYBjORY-gyGqQfjW5lw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_l2cVv94eS7u-VplKZjvsqg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_wUWtP2tFT5G-aNplM9vcGA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_biDnUMzDRf6UT0GwRVlVew" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div><p><em>Attending conferences is a crucial way our staff can keep up to date with cutting-edge research, be introduced to important new ideas and perspectives, and help inspire and support the next generation of cyber security professionals. Our&nbsp;<a href="https://idcybersolutions.com/" target="_blank" rel="noreferrer noopener">ID Cyber Solutions</a>&nbsp;Conference Report series aims to showcase some exciting and ground breaking ideas presented at these events.</em></p><p><strong>Report by Cary Hendricks, Global Operations Director</strong></p><p>The <a href="https://www.dfeg2024.com/">9th INTERPOL Digital Forensics Expert Group (DFEG)</a> conference ran from 19–21 June 2024 at Edinburgh Napier University.</p><p>The event was very well attended by law enforcement officers from all over the world coming to Scotland where the event was held for the very first time. Many thanks to The Cyber Academy (particularly Basil Manoussos) and the School of Computing, Engineering and the Built Environment at Edinburgh Napier University, which hosted the event. </p><p>The three days were packed with exciting and valuable talks, and it would be impossible to write about every talk. The summaries below represent just a small selection.</p><p><strong>Day 1</strong></p><p>AI was covered extensively, including the advances in AI’s role in law enforcement and how it has had a very pronounced effect, in that it can make digital forensic investigations much faster by doing very monotonous tasks and then processing the results from those tasks. Tasks that used to take weeks, and sometimes months, can now be processed in a few hours.</p><p>The role of AI is changing. For example Dr Hans Henseler from the Netherlands Forensic Institute and Leiden University of Applied Sciences showed how Copilot could be made extremely useful in trawling through huge amounts of data. The main objective was to keep the AI from external influences and only work on the data it was given. Adding this capability to their forensic software (Hansken) means they can now offer DfAAS (digital forensics as a service).</p><p>Adrien Vincart from PWC gave a fascinating insight to further extend digital forensics using AI, where resources are very scarce and the process needs to accelerate to enable investigators and researchers to investigate and deliver their results in a timeous fashion. Waiting times of many months, even years are now slashed to very manageable timescales, freeing up investigators.</p><p>Scott Fitzmaurice, Forensic Analytics, showed how behavioural investigation in location data could be used along with AI to process a huge amount of location data from various devices, including vehicles.</p><p>Another excellent presentation by Pavel Goldman-Kalaydin showed the extraordinary tasks that law enforcement now face with the advent of deepfake images and videos and the investigation of those materials. The research and techniques show that AI is getting better at generating the data but using AI to spot those AI generated images is key without human bias.</p><p>Along the same track Marco Fontani gave a complementing insight on how deep learning is vital for image and video forensics. These techniques were based on clearing up very poor digital images like, for example, vehicle registration marks (number plates to us).</p><p>A particular challenge that law enforcement faces is child sexual abuse material (CSAM) and Ian Stevenson from Cyacomb gave a compelling talk about how new technology is supercharging the fight against this. No longer would victims have to wait months before any action, but also any accused can now be processed really quickly (minutes...) and be given the all clear or notice that they would be charged for offences.</p><p><strong>Day 2</strong></p><p>Following from the previous day, the focus was on triage: how to quickly find out what is important and focus on that. This has had a profound way how cyber security and digital forensic incidents are being investigated.</p><p>Simon Foster, Detective Inspector – POLIT, gave an hopeful account of how technology is making the investigations go a lot faster by citing examples where the technology has excelled. The time to get information, processing, and reacting made a huge difference in protecting children who are being abused. This massively reduced the trauma and increased the prosecution of individuals who perpetrate these crimes.</p><p>Alex Caithness, Principal Analyst (R&amp;D), CCL Forensics gave an in depth discussion of open tools for browser forensics. Although this was an product agnostic talk, it delved into the technology that makes up a browser and how it can be investigated. It added valuable information to any investigator who can now extract more information from artifacts than what some forensic products can do. This gave a real insight of how far we have come, but also how long the path is forward.</p><p>Stephen Lewington, BERLA gave an excellent presentation about vehicle telematics (the stuff the car stores about you) and how it is used to investigate crimes. This is vital for law enforcement but also has information useful to insurance companies. Some of the data is stored only for the short time but can drastically assist in the investigation into fatal road accidents. The talk also included<mark style="background-color:rgba(0, 0, 0, 0);" class="has-inline-color has-vivid-red-color"></mark>information on how you could ensure that only the necessary data was being stored and how that data is being used by your vehicle.</p><p>Some of the futuristic investigations ventured into the Metaverse, that AI online world where avatars rule the day... We heard a great presentation by Sundaresan Ramachandran on how crimes are committed in the Metaverse and how law enforcement would go about investigating it. From NFT (Non Fungible Tokens) to crypto currency, all of it had links to our “real world”. This is an area where investigations are going to grow a lot in the future.</p><p><strong>Day 3</strong></p><p>This was a day featuring lots of weird and esoteric technologies. It started with data acquisition from ‘non-standard’ devices. These devices might be medical devices, for example, or devices that can provide information (like logs) but have absolutely no interface to provide that information. This was a deep dive into collecting that information.</p><p>Other presentations were more about automotive cyber security and the challenges and opportunities to obtain data for investigations. All the weird and wonderful technology that surrounds us can help to give a fuller picture of what really happened. For those who are thinking that this is a massive surveillance exercise, it is not. It is the information at the point in time to help figure out what happened and from a safety point improve and save lives in the future.</p><p>The future is here, but as investigators we are being overwhelmed with data and it is technology’s role to make it easier to make sense of it all.</p><figure class="wp-block-image aligncenter size-large is-resized"><img src="https://cybertraining.uk/wp-content/uploads/2024/06/1719059958125-1024x440.jpg" alt="Cary and Basil standing beside a pop-up banner that says 'Interpol, DFEG 2024, 9th Digital Forensics Expert Group'." class="wp-image-9171" style="width:1024px;height:auto;"><figcaption class="wp-element-caption"><em>Cary with Basil Manoussos, Manager at The Cyber Academy and organiser of the event</em></figcaption></figure></div></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Thu, 27 Jun 2024 14:13:23 +0000</pubDate></item><item><title><![CDATA[ID Cyber Solutions Conference Report — G3C 2023 (Mac's first event!)]]></title><link>https://www.cybertraining.uk/blogs/post/g3c-2023</link><description><![CDATA[<img align="left" hspace="5" src="https://www.cybertraining.uk/Untitled-design-16-e1702030491496.png"/>Attending conferences is a crucial way our staff can keep up to date with cutting-edge research, be introduced to important new ideas and perspectives ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_iY-KnGKKDMU-bQrhcEcGAg" data-element-type="section" class="zpsection zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_r52efza56xeZGbswd6AsLA" data-element-type="row" class="zprow zprow-container zpalign-items-center zpjustify-content-flex-start " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_F-mlJvx4BDLvS0-PrtuuSg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_dnX8ybNEHCIsub76QnNomw" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-style-none zpheading-align-left " data-editor="true"><div style="color:inherit;"><h1 style="font-size:24px;">ID Cyber Solutions Conference Report — G3C 2023 (Mac's first event!)</h1></div></h2></div>
<div data-element-id="elm_p1ywnV-VFsyXBvf71zK4NQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:left;"><em>Attending conferences is a crucial way our staff can keep up to date with cutting-edge research, be introduced to important new ideas and perspectives, and help inspire and support the next generation of cyber security professionals. Our&nbsp;<a href="https://idcybersolutions.com/" target="_blank" rel="noreferrer noopener">ID Cyber Solutions</a>&nbsp;Conference Report series aims to showcase some exciting and ground breaking ideas presented at these events.</em></p><p style="text-align:left;">Report by Iain (&quot;Mac&quot;), Cyber Essentials Assessor.</p></div></div>
</div></div><div data-element-id="elm_T-1sj7asbrO_hKKsmcbQnQ" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-6 zpcol-sm-12 zpalign-self- zpdefault-section zpdefault-section-bg "><style type="text/css"></style><div data-element-id="elm_ICcxZ9aQ1KUlCFEq9JU7LQ" data-element-type="image" class="zpelement zpelem-image "><style> @media (min-width: 992px) { [data-element-id="elm_ICcxZ9aQ1KUlCFEq9JU7LQ"] .zpimage-container figure img { width: 540px ; height: 303.50px ; } } @media (max-width: 767px) { [data-element-id="elm_ICcxZ9aQ1KUlCFEq9JU7LQ"] .zpimage-container figure img { width:415px ; height:276.63px ; } } </style><div data-caption-color="" data-size-tablet="" data-size-mobile="" data-align="center" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimage-container zpimage-align-center zpimage-tablet-align-center zpimage-mobile-align-center zpimage-size-fit zpimage-tablet-fallback-fit zpimage-mobile-fallback-fit "><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Untitled-design-16-e1702030491496.png" width="415" height="276.63" loading="lazy" size="fit"/></picture></span></figure></div>
</div></div></div></div></div><div data-element-id="elm_ucNOzN0dTde26u4mjUrkPQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_Ear0y3s3R2691WTNp8KIQA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_AVgodPUrQ3aR4w2z3EVc8A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_NKZKhZsYTrq9GHcOUxIlMQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p style="text-align:left;">It was Saturday 4<sup>th</sup> November and I was at Glasgow Caledonian University for the Glasgow Caledonian Cyber Convention (or G3C). I must admit I was pretty nervous. This was my first conference, so I had no idea what to expect.<br></p><p style="text-align:left;">After fighting with the banner stands and laying out swag (as a sponsor, we had a stand at the event), I was ready to start networking.</p><p style="text-align:left;">Kick-off!</p><figure class="wp-block-image aligncenter size-large is-resized"><div style="text-align:left;"><img src="https://cybertraining.uk/wp-content/uploads/2023/12/20231104_091714-edited-scaled.jpg" alt="" class="wp-image-9127" style="width:698px;height:auto;"></div><figcaption class="wp-element-caption" style="text-align:left;"> Yours truly, running the ID Cyber stand. Photo by Gerard Barrett </figcaption></figure><p style="text-align:left;">I had a lovely chat with folks at Quorum Cyber (one of the other sponsors) and great conversations with Dr Jackie Riley (the Head of Glasgow Caledonian’s Cyber Security and Networks department) and with students who were curious to know more about working in the cyber security industry. Our ID ‘Cybear’ mascot is always a great conversation starter, and students wanted to know more about who ID Cyber are and what we do. &nbsp;Interestingly, I was asked by students about the perception of tattoos in a professional environment in 2023. (Your dearest author has <em>quite</em> a few!) Everyone I spoke to was lovely, especially so early in the morning before caffeine had hit our systems.</p><p style="text-align:left;">G3C is a multi-track event so I wasn’t able to attend all the talks. Keep an eye out for G3C channels to catch any of the talks I missed (or indeed those I saw!).</p><h2 class="wp-block-heading" style="text-align:left;"><u>Stephen Rattigan — Work Smarter Not Harder: The Power of Automating Your Daily Tasks</u></h2><p style="text-align:left;">First talk and it’s ID Cyber’s very own Stephen Rattigan presenting the key to ‘Work Smarter Not Harder: The Power of Automating Your Daily Tasks’.</p><p style="text-align:left;">Even though I get to watch Steve work his automation magic on a near-daily basis I had a blast watching and listening.Why does automation matter? Think about your daily tasks. It all takes time, it’s repetitive… and we’re human. We make mistakes!Steve wants to make life easier: maximise productivity without expending more of your precious time and energy to do so.</p><p style="text-align:left;">He posed the question ‘To automate or not to automate?’ Well, there’s a great acronym to determine if a process should be automated or not:</p><ul><li style="text-align:left;"><strong>C</strong>onsistent</li><li style="text-align:left;"><strong>R</strong>epeatable</li><li style="text-align:left;"><strong>A</strong>uditable</li><li style="text-align:left;"><strong>P</strong>rocesses</li></ul><p style="text-align:left;">You can see that right? It’s <strong>CRAP.</strong></p><p style="text-align:left;">If your automation doesn’t follow <strong>CRAP</strong> then it’s probably going to take more time/labour to implement than the task itself. In these scenarios it’s not worthwhile to automate. However, if it will increase productivity, efficiency, and consistency then consider automation.</p><p style="text-align:left;">Steve then detailed how he uses automation to help at work:</p><ul><li style="text-align:left;">Auto disable caps lock (isn’t it a pain when you’re typing and it suddenly turns into SHOUTY MESSAGE?)</li><li style="text-align:left;">Snipping tool added to middle mouse click</li><li style="text-align:left;">Keyboard shortcuts for PowerShell commands that are tricky to remember</li></ul><p style="text-align:left;">Warning! Like anything in IT or cyber security, automation carries risk:</p><ul><li style="text-align:left;">Be wary of installing automation tools on company devices! Always ask permission.</li><li style="text-align:left;"><strong>Don’t</strong> use it for passwords.</li><li style="text-align:left;">Scripts can be flagged as <strong>malware.</strong></li><li style="text-align:left;"><strong>ALWAYS</strong> have a kill key.</li><li style="text-align:left;">Be careful <em>what</em> you automate.</li></ul><p style="text-align:left;">For more of Steve’s insights, including useful tools, check out his talk once recordings are released!</p><figure class="wp-block-image aligncenter size-large is-resized"><div style="text-align:left;"><img src="https://cybertraining.uk/wp-content/uploads/2023/12/Steve-G3C-1024x768.jpg" alt="" class="wp-image-9130" style="width:692px;height:auto;"></div><figcaption class="wp-element-caption" style="text-align:left;"> Steve's talk on automating your daily tasks. Photo by Alice McGready </figcaption></figure><h2 class="wp-block-heading" style="text-align:left;"><strong><u>Alice McGready — Communication Breakdown</u></strong></h2><p style="text-align:left;">Another one of ID Cyber’s talented roster, Alice provided a great insight into ‘Communication Breakdown’, &nbsp;or the importance of conciseness, clarity, and the impact of typos.</p><p style="text-align:left;">It’s not just your pride that’s hurt when you send correspondence with typos – it can affect people’s perceptions, confidence, or trust in you! Even outwith an office environment they can have catastrophic effects. They could cause international or political incidents. For example: US military correspondence being leaked to private email addresses in Mali (.ML) instead of the military (.MIL); a nuclear test at the Sedan site in Nevada was erroneously reported as being carried out in Sudan, attracting worldwide attention; and finally, the Mariner 1 spacecraft didn’t even make it to orbit because of a typo!</p><p style="text-align:left;">Typos can cause reputational damage and lack of trust in your organisation. (This one is for the commuters and Glasgow locals!) Alice told a story in pictures about a junction near Cowcaddens where a sign is erected, falls, and remains there for at LEAST 7 years before it is replaced… and the replacement has one of Glasgow’s most well-known streets spelled incorrectly. It’s ‘Buchanan’ <strong>not</strong> ‘Buchannan’! That doesn’t exactly inspire trust in the local council.</p><p style="text-align:left;">Interestingly, 43% of recruiters listed spelling errors as sufficient grounds for immediate rejection. Can you imagine you’ve put “attention to detail” as one of your strengths?! (Don’t do that, by the way. You’re inviting people to look for a mistake!)</p><p style="text-align:left;">After providing a series of helpful tips on how to avoid typos (check out the recording when it’s released!), Alice leaves us with a contemplative call to action: You have to care. You are advertising yourself/your product or brand. Take pride in your work. Take pride in your words.</p><h2 class="wp-block-heading" style="text-align:left;"><strong><u>James &amp; Chris Bore — Mixology, Multidimensional Information Spaces, and Security</u></strong></h2><p style="text-align:left;">Now, I was glad I was well caffeinated for this one. It was fascinating!</p><p style="text-align:left;">James presented us with information theory: Spaces where we can represent messages and ways to communicate effectively in the presence of noise (anything that can distort a message). A dimension can be anything, for example, any 3-letter message can be encoded in 3D space/3D vectors, and taste is a 6-dimensional space. It’s mixology time!</p><p style="text-align:left;">James plotted 41 different cocktails against six tastes: tart, bitter, sour, sweet, spicy, and salty.</p><p style="text-align:left;">Now we observe the archetype of cocktails, sharing similar characteristics yet entirely distinct! Anything that fits in boundary boxes could hypothetically be one of the archetypes but… it doesn’t necessarily make it the same. For example, the martini boundary-box is so ranged that anything could hypothetically be a martini.</p><p style="text-align:left;">But how does this relate to security? We have lists of attacks and exploitation methods using CAPEC &amp; MITR-ATTK and we can classify APTs in a risk space, but cyber security has been slow to adapt to hyperdimensional standards which are used in other industries.</p><p style="text-align:left;">What issues do we face? Data normalisation (or cleaning) is the main sticking point and from this the industry needs to adapt and collect data in a way that is normalised. With regards to threat modelling, you can just assign numbers to things. James advised: “3 is better than ‘high’ because you can do maths at it!”</p><h2 class="wp-block-heading" style="text-align:left;"><strong><u>Scott McGready — This conference sucks</u></strong></h2><p style="text-align:left;">I’m going to be honest, I didn’t take a lot of notes here. If any of you know Scott, then you’ll understand why – if you don’t… Well, I don’t wait to spoil the delivery – you’ll need to watch the recording for that.</p><p style="text-align:left;">This conference sucks. There’s too many inside jokes, it’s all the same speakers, talks you want to see clash, it’s cliquey, there’s inexperienced speakers, it’s all just about networking.</p><p style="text-align:left;">He got us there…</p><figure class="wp-block-image aligncenter size-large is-resized"><div style="text-align:left;"><img src="https://cybertraining.uk/wp-content/uploads/2023/12/signal-2023-11-04-14-33-09-031-1024x576.jpg" alt="" class="wp-image-9133" style="width:721px;height:auto;"></div><figcaption class="wp-element-caption" style="text-align:left;"> Scott looking mischievous at the start of his talk... Photo by Gerard Barrett </figcaption></figure><p style="text-align:left;">You see, conferences suck if <strong>you</strong> make them suck!</p><p style="text-align:left;">There’s too many inside jokes? Ask for the context!</p><p style="text-align:left;">It’s all the same speakers? Volunteer to give a talk!</p><p style="text-align:left;">Talks you want to see clash? It happens!</p><p style="text-align:left;">It’s cliquey? It may seem that way but it’s because all of these people met each other <strong>at</strong> conferences!</p><p style="text-align:left;">There are inexperienced speakers? Everyone must start somewhere and there’s only one way to get better!</p><p style="text-align:left;">It’s all about networking? This is great. Speak to people. You’ll find out about jobs; you’ll meet interesting people from all walks of life. Networking is a good thing!</p><p style="text-align:left;">This conference sucks… if you make it suck.</p><p style="text-align:left;">That was fantastic, that was bonkers, that was so much fun! If you want to experience it, check out the recording when it’s released.</p><h2 class="wp-block-heading" style="text-align:left;"><strong><u>Cary Hendricks — That’s a Good Question, Kev</u></strong></h2><p style="text-align:left;">Last up, it’s the vanguard of ID Cyber Solutions, Cary Hendricks, presenting ‘That’s a good question, Kev’, amusingly named after a podcast where Cary would answer every one of his co-host’s questions in that same manner.</p><p style="text-align:left;">I wanna work in cyber – how do I get into it?</p><p style="text-align:left;">Firstly, what do you want to be? The careers within the industry are highly diverse. Everything isn’t penetration testing! With so many roles available it pays to know the areas you may wish to specialise. You may work for an organisation helping IT through the creation and implementation of policies/procedures – that’s cyber. All these things encompass information and data. You can still work within cyber and be non-technical!</p><p style="text-align:left;">An ever-present notion in information technology is the evolution of that technology vs its ease of use. As we witness greater network proliferation this encompasses its own problems! So what are the persistent security challenges?</p><ul><li style="text-align:left;">Maintaining compliance</li><li style="text-align:left;">A lack of qualified and skilled professionals</li><li style="text-align:left;">Centralising security in a distributed computing environment</li><li style="text-align:left;">Fragmented and complex privacy and data protection regulations</li><li style="text-align:left;">Compliance issues with BYOD</li><li style="text-align:left;">Relocation of sensitive data from legacy data centres</li></ul><p style="text-align:left;">Standards and certifications like Cyber Essentials and Cyber Essentials Plus can aid businesses with these challenges, making sure that organisations recognise how to secure their data.</p><p style="text-align:left;">There are so many roles within the world of cyber: technical, non-technical, and otherwise. Where will your journey start?</p><figure class="wp-block-image aligncenter size-large is-resized"><div style="text-align:left;"><img src="https://cybertraining.uk/wp-content/uploads/2023/12/Cary-G3C-1024x768.jpg" alt="" class="wp-image-9131" style="width:778px;height:auto;"></div><figcaption class="wp-element-caption" style="text-align:left;"> Cary delivering a great keynote. Photo by Alice McGready </figcaption></figure><p class="has-text-align-center" style="text-align:left;">_________________________________________________________________________________________________________________</p><p style="text-align:left;">What a blast that was! I met a tonne of people, some I’ve only ever spoken to online, some I’ve known for years, and some new faces. My colleagues were busy preparing and hosting talks, so it forced me to socialise. (I’m glad that was the case!) Having spent the last few years working from home that was exactly what I needed. G3C has cultivated a friendly, open environment for people, students, and industry professionals: a place to meld and inspire collaboration and transparency for those interested in the cyber security world.</p><p style="text-align:left;">I’ll be back – I can’t wait for the next conference. Who knows, maybe one day I’ll speak at one!</p><p style="text-align:left;">Time for food. Damn, I’m hungry!</p><figure class="wp-block-image aligncenter size-large is-resized"><div style="text-align:left;"><img src="https://cybertraining.uk/wp-content/uploads/2023/12/20231104_103406-1024x768.jpg" alt="" class="wp-image-9132" style="width:790px;height:auto;"></div><figcaption class="wp-element-caption" style="text-align:left;"> Me, Alice, and Steve. Photo by Gerard Barrett </figcaption></figure></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 08 Dec 2023 09:15:42 +0000</pubDate></item></channel></rss>