Connect with us

Infosecurity

Steelcon 2016: How a Northern Hacker Conference Became a Must-Attend for Security Research

Published

on

Steelcon 2016: How a Northern Hacker Conference Became a Must-Attend for Security Research

Last weekend, I traveled north of the Watford Gap to attend a security conference that has grown remarkably in just a few years. Steelcon, held at Sheffield Hallam University, started in 2014 with 150 delegates. It doubled to 300 in 2015, and this year hit maximum capacity with 450 attendees. Billing itself as a hacker con “with a northern edge,” the event welcomed some of the biggest names in the UK information security scene. After watching its impressive growth from afar, I finally secured a ticket and experienced it firsthand.

Why Steelcon Stands Out in Security Research

What makes Steelcon special? For one, the vibe is electric. Held in a well-lit atrium at the university, the conference is family-friendly, with a separate kids’ track teaching app development and lock picking. The Saturday timing, combined with a sunny July weekend, adds to the relaxed atmosphere. Even the badge—a toy whippet—was a challenge to source 450 of, as organizers noted. But beyond the charm, the focus on security research is what draws the crowd.

The event featured two speaking tracks, allowing me to hop between sessions. I started with Chris Truncer, whose talk on bypassing antivirus software centered on shellcode. As someone less technical, I found it dense, but the audience of researchers clearly gained insights into evading detection.

Imposter Syndrome and Human Factors in Security

Switching to track two, Dr. Jessica Barker presented her research on “imposter syndrome,” a topic I’d discussed with her at Infosecurity Europe. Her talk was less technical but deeply relevant, addressing confidence, fitting in, and convincing recruiters you’re right for the job. Barker emphasized the “desire to be liked” and advised surrounding yourself with positive people—radiators, not drains—and “doing anything that pushes you out of your comfort zone.” This session highlighted that security research isn’t just about code; it’s about people too.

Technical Talks: Memory Forensics and Banking Malware

Later, I caught Darren Martyn from Xiphos Research, who gave an “18-rated” talk (all speakers had BBFC-style ratings due to children present) on memory forensics. After lunch, Proofpoint researchers Wayne Huang and Sun Huang detailed the Northern Gold attack campaign. They explained how attackers buy WordPress credential lists to spread Qbot malware, infecting 500,000 systems and sniffing 800,000 online banking transactions. Since December 2015, they’ve used an exploit kit for Qbot. This kind of deep-dive security research is exactly what Steelcon excels at.

Car Hacking Takes Center Stage

As the talk ended, attendees filtered to track two for Scott Helme’s presentation on the Nissan Leaf. Helme, working with Troy Hunt, was reluctant to call it “hacking” since the car wasn’t built with security in mind. He found a new API framework in the mobile app that was “definitely not secure.” Using a Python script, he could locate any Leaf globally, change its charging schedule, toggle air conditioning, and repeatedly alter battery charge from 95% to 100%—potentially voiding the warranty. Helme presented this to Nissan and the Information Commissioner’s Office, but got no satisfactory response. Perhaps the surge in ethical car hacking will push regulators to act.

Finishing the day, Chris Ratcliff’s talk “Vorsprung Durch Hacknik” explored why cars are hackable. He noted that no two manufacturers are the same; every car starts from scratch, with each component having its own control point. In a striking slide, Ratcliff showed that while there have been seven iPhone models, there’s been only one BMW 5 Series. Except for Tesla—a tech company that makes cars—the auto industry is heavy on bought-in parts, causing problems when those parts fail. “Are manufacturers going to retro-fit?” he asked, predicting security will become a selling point. The frustration is that when cars can’t be upgraded, consumers must buy new ones.

Why Steelcon Matters for UK Security Research

The event ended with organizer Robin Wood declaring that despite selling out, Steelcon will stay at the same venue. A massive charitable donation was made, later doubled to around £1,500 after an after-party collection. So why does Steelcon matter? It’s an event outside London, family-friendly, with an excellent venue. It strengthens the UK information security scene. This was one of the best conferences I’ve attended in years. If tickets go on sale for 2017, I’ll be there—and I expect a surge in demand.

For more on security events, check out Infosecurity Europe 2025 or read about ethical hacking trends.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Infosecurity

Why Your Service Desk Must Be the First Line of Defense Against Hackers

Published

on

Why Your Service Desk Must Be the First Line of Defense Against Hackers

Cybercrime is accelerating at an alarming rate. According to AV-Test, an independent IT security institute, nearly 390,000 new malware samples are discovered daily — that’s over 270 every minute. Financially motivated criminals, state-sponsored actors, and hacktivists now have sophisticated tools to launch targeted attacks. For many organizations, the question is no longer if a breach will occur, but when.

Traditional defenses like firewalls and antivirus software are no longer sufficient. In an era of zero-day vulnerabilities and advanced persistent threats, the first line of defense must be more proactive. This is where the IT Service Desk steps in, supported by a layered strategy that includes patch management, application control, and vigilant monitoring.

The Growing Threat of the Insider

Research from the Ponemon Institute reveals a startling fact: the biggest cybersecurity risk today is the negligent or careless employee. With multiple mobile devices, frequent use of commercial cloud apps, and remote work, insiders can inadvertently open the door to attackers. A staggering 75% of organizations have experienced a data breach due to insider threats, many stemming from a lack of cybersecurity awareness rather than malicious intent.

Senior leadership must recognize that proper staff screening and ongoing education can be more effective than legacy firewalls. By fostering a culture of security, companies can reduce the risk of malware exploiting unpatched systems or insecure third-party applications.

How the Service Desk Becomes Your Cyber Shield

Modern malware scans for unpatched machines and non-Windows third-party apps that don’t update automatically. While IT teams work tirelessly to keep internal systems updated, the only way to ensure safety is a rapid detect and respond routine. The Service Desk is uniquely positioned to spot unusual behavior — such as multiple users reporting slow PCs or frequent application crashes — which could signal a broader cyber attack.

Users rarely report issues directly to the security team. Instead, they call the Service Desk. This makes the desk an ideal observatory for identifying meaningful trends. For example, a sudden spike in help tickets about performance issues might indicate a hidden malware infection. Therefore, training Service Desk staff to recognize these patterns is critical.

Equipping the Service Desk for Cyber Defense

Organizations can take several practical steps to empower their Service Desk:

  • Automated patching: Proactively manage operating system and application vulnerabilities.
  • Endpoint protection: Ensure only authorized applications run on company devices.
  • Removable device control: Enforce policies that regulate data transfer via USB drives and other peripherals.
  • Application whitelisting: Use intelligent whitelisting to block unauthorized software.

These measures, combined with a well-trained Service Desk, create a robust first line of defense that blocks the majority of incoming threats. As a result, the organization gains both efficiency and security.

Staying Ahead of Evolving Threats

Cyber threats are constantly evolving. To stay protected, it’s essential to keep up with the latest attack vectors, pay greater attention to all security layers, and think strategically. While the volume and diversity of threats can seem overwhelming, most can be addressed by implementing a comprehensive, layered system. Everyone in the organization must take responsibility for cybersecurity, but the Service Desk’s monitoring and alerting capabilities make it the ideal first responder.

As the saying goes, “forewarned is forearmed.” Even the most advanced security tools are useless against a threat that remains undetected within the network. By positioning the Service Desk as the first line of defense, organizations can detect anomalies early and mitigate damage before it escalates.

For more insights on building a resilient security posture, explore our guide on insider threat prevention and learn about layered security strategies.

Continue Reading

Infosecurity

I Survived a Ransomware Attack: Here’s What I Learned About Staying Safe

Published

on

I Survived a Ransomware Attack: Here’s What I Learned About Staying Safe

Imagine opening a file on your laptop, only to find that every document, photo, and project is suddenly locked behind a digital wall. That’s exactly what happened to me—and I’m now a ransomware survivor. It wasn’t a Hollywood thriller; it was a Tuesday afternoon. But the experience taught me more about ransomware attack prevention than any training session ever could.

How I Became a Ransomware Survivor

It started innocently enough. I clicked a link to download a whitepaper about preventing ransomware—ironic, right? The ad was from a reputable security company, but the link led to a compromised ad server. The domain ransomware attackers had snatched it up the moment it expired.

Within seconds, a tiny window flashed on my screen. Then, silence. When I tried to open my files, a message appeared: they were encrypted, and I needed to pay a ransom in Bitcoin to unlock them. None of my security tools—no data loss prevention, no active defense—raised an alarm.

Why I Was Lucky (and You Can Be Too)

As a ransomware survivor, I had a few things going for me. First, I immediately disconnected my laptop from all networks, isolating the infection to one device. Second, I had recent backups. But here’s the real twist: the ransomware strain was a derivative of Locky, and its encryption code was poorly hidden. Using free tools from BitDefender and community-written scripts, I recovered most of my files without paying a cent.

This isn’t typical. Many ransomware attacks use stronger encryption, and paying the ransom often leads to more problems—attackers may leave backdoors or demand more money. My advice: never pay, and always have a plan.

Practical Steps to Avoid a Ransomware Attack

1. Backup Smart, Not Just Often

Regular backups are essential, but criminals now target backup files too. Keep your backup system offline after each cycle. Use the 3-2-1 rule: three copies, two different media types, one off-site.

2. Educate Users with Real-World Drills

Instead of boring policy documents, run mock ransomware drills. Lock a user’s device temporarily to show how quickly data can disappear. It’s memorable and effective.

3. Segment Your Network

Isolate high-value data on separate network segments. Use a BYOD policy that allows personal devices on a sandboxed network, away from critical systems. This limits the blast radius of any infection.

4. Conduct Regular Vulnerability Assessments

Identify weak spots before attackers do. Pair vulnerability scans with penetration tests, but remember: security is a balance between risk and cost.

Building Cyber Resilience in a New Normal

Ransomware isn’t going away. But with the right mindset—backup, isolation, and user awareness—you can minimize damage. As a ransomware survivor, I can tell you: the fear is real, but so are the solutions. Start with security hygiene basics and build from there. For more on ransomware prevention, check our detailed guide.

Remember, ransomware attack prevention isn’t just about technology; it’s about habits. Test your backups. Run a drill. Talk to your team. Because the next click could be the one that changes everything.

Continue Reading

Infosecurity

Are CEOs Judged Not to Have Ensured Necessary Cybersecurity? The New Reality

Published

on

Are CEOs Judged Not to Have Ensured Necessary Cybersecurity? The New Reality

When a major cyber-attack hits, the spotlight often falls on the chief executive. But a recent report from the UK’s Culture, Media and Sport Committee suggests that CEOs cybersecurity compensation could soon be directly tied to how well they protect their organisations. This is no longer just an IT issue—it’s a boardroom liability.

The investigation, triggered by the October 2015 cyber-attack on TalkTalk, has delivered two stark recommendations that every enterprise leader should understand. Whether you run a small business or a multinational, the message is clear: ignore cybersecurity at your peril.

Linking CEO Pay to Cybersecurity Performance

The committee’s report, published on 17 June, proposes a radical shift in executive accountability. It suggests that a portion of CEO compensation should be linked to effective cybersecurity. In the committee’s own words: “To ensure this issue [cybersecurity] receives sufficient CEO attention before a crisis strikes, a portion of CEO compensation should be linked to effective cybersecurity, in a way to be decided by the Board.”

This recommendation alone is a wake-up call for many leaders. Remuneration committees will now have to grapple with how to measure cybersecurity effectiveness. Lawyers, too, can expect a new stream of work as they help define what constitutes “effective” protection.

How Will Boards Measure Cybersecurity?

Implementing this will not be straightforward. Boards will need to establish clear metrics—perhaps based on incident response times, employee training completion rates, or vulnerability patching schedules. The key is to move beyond vague promises and create tangible targets that align with business risk.

GDPR and the Threat of Custodial Sentences

Even more alarming for executives is the second recommendation. The committee concurs with the Information Commissioner’s Office (ICO) that, while the EU General Data Protection Regulation (GDPR), effective from 2018, will sharpen focus on data protection, a full range of sanctions—including custodial sentences—would be beneficial.

This means that enterprise executives could not only lose money if they are judged not to have ensured the necessary cybersecurity, but they may also face imprisonment. The prospect of jail time for data breaches is a dramatic escalation that demands immediate attention.

The Growing Cyber-Crime Threat

Some may view these recommendations as extreme. However, the report highlights that cyber-crime is a mounting risk for businesses of all sizes. According to the Federation of Small Businesses (FSB), a third of their members have experienced cyber-crime. Meanwhile, a 2015 survey by PwC for the Department for Business, Innovation and Skills found that 90% of large organisations had suffered a security breach.

Executives constantly balance risk and reward. Many have previously assumed that cyber-attack risks are negligible, relegating cybersecurity to the bottom of the business agenda. The committee’s novel approach aims to change that calculus by tying personal financial and legal consequences to cybersecurity outcomes.

ICO’s Expanded Audit Powers

Another critical development is the call for the ICO to gain additional non-consensual audit powers, particularly in health, local government, and potentially other sectors. Currently, the ICO has limited ability to inspect systems without consent. If this changes, regulators could knock on your door to verify compliance with security standards.

Businesses already accept that HMRC may inspect accounts to ensure tax and VAT payments are correct. A similar regime for cybersecurity would mean keeping your digital house in order at all times. The committee’s report states: “At present, the ICO has limited powers of non-consensual audit… the ICO should have additional powers of non-consensual audit.”

What This Means for CEOs Today

The TalkTalk incident involved the theft of customer records, including bank account details. Tens of thousands of individuals had their personal information compromised. In response, diligent CEOs—mindful of their income and liberty—are now asking searching questions about IT security. They are also listening with renewed sympathy to their CIO’s pleas for increased cybersecurity budgets.

As a result, the message is clear: cybersecurity is no longer just a technical concern. It is a core governance issue that affects compensation, legal liability, and even personal freedom. CEOs who fail to act may find themselves judged not only by the market but also by the courts.

For more insights on how to protect your organisation, explore our guide on cybersecurity risk management strategies and GDPR compliance steps.

Continue Reading

Trending