
Giving a voice to the
future...
Meet the Speakers

Keynote Speaker - Holly Foxcroft - LinkedIn
Holly has carved a unique career specialising in understanding neurodiversity and all things cyber. In her 15 year cyber security career, she has collected many awards across many years celebrating her work and dedication to influence neuroinclusion in cyber security.
In this talk, Holly will guide us through how she started pulling together her work in cyber security and her personal life of advocating for neuroinclusion, and how this set her down the rabbit hole of furthering research and championing change. Speaking authentically and raw, Holly will share real life examples of how important neuroinclusion can be, and how it impacts cyber security directly.

Inaugural Flight - a retrospective on the first year of the UWE CTF Falcons
My presentation is a lookback the personal, interpersonal and professional growth that happened during the development year of the Falcons and understanding teamwork skills, specifically the Importance of choosing the right team members and Importance of people in an organisation with ambition as big as ours and the joy of helping upliftting others

Secure Automated Farming
The talk will be about the rise of Controlled Environment Agriculture and the security questions around it. I will be talking about my final year project as it related to the presentation. The presentation will conclude with me demonstrating how by providing a secure farming system, it can transform how we grow our food.

Quantum Hacking: Facts, Fiction and Future Threats
Quantum computing has to ability to change cybersecurity as we know it - for better or for worse. Can quantum computers break classical encryption? Can they hack quantum cryptographic systems? Can they change power dynamics globally? The reality of quantum hacking lies at the intersection of science and speculation - but by examining the current capabilities of quantum computers, the reality of post-quantum technology, and vulnerabilities in protocols, we can separate fact from fiction. The question remains: is quantum hacking a genuine threat or just fearmongering - and what does it mean for the future of our digital security?

Xtreme Forensics - A Critical Digital Forensic Analysis and Procedural Framework for the Flipper Zero
It is nearly impossible for digital forensic investigators to stay up to date with all emerging technologies.
My talk will be on my final year project, the creation of a procedural framework for forensic investigations of the Flipper Zero. It will address every step of the forensic process, starting with addressing its live forensics if found on a crime scene and it's collection. It will cover dead and live imaging, where I will show the tool I've created to access and extract the encrypted internal memory. Finally, it will cover the examination, including notable artefacts and extended functionality.

Breach Data: The Hackers Playground
I am going to have a localhosted webpage similar to the illicitservices website that has since been taken down. My talk will show a demonstration of how easy it is to compromise users who have had their data leaked and showing MD5 hashes being cracked in real time.

Don't Feed the Phish: How to train people not to click on links
This presentation will look into the current issues with security awareness training, gaps in research, and where these issues seem to stem from. It will also include some critique of the ISO 27001 and NIST 800-53 frameworks and why overgeneralisation is not always the best answer.

With the ever increasing use of IoT devices in everyday life, I want to create a low cost device accessible to hobbyists that can be the interface between complex technology and simple home life. With convenience being highly prized in the 'Home Life' category of products I aim to make an easy to setup and use device accessible to as many people as possible. To this end I will be revisiting a project I made some time ago where I made a budget smart mirror for home automation.