Speakers

Security BSides Athens 2025




BsidesAth Speaker

Keynote

A Conventional, Yet Unconventional Law Enforcement Career...

by Craig Jones, @Twitter

Abstract: The evolution of digital and cybercrime over the past four decades has been shaped by rapid technological advancements, shifting threat landscapes, and evolving defensive strategies. This presentation offers a firsthand perspective on navigating a career in this dynamic field from the early 1980s—when cyber threats were emerging alongside personal computing—to the complex, AI-driven cybercrime ecosystem of 2025. Key milestones in digital forensics, threat intelligence, and cybercrime will be highlighted, along with lessons learned from working on the frontlines of cyberspace. Attendees will gain insights into the skills, adaptability, and strategic thinking required to combat cyber threats across eras, as well as predictions for the future of cybercrime and defence.

Bio: Craig Jones is an international cybersecurity and law enforcement expert with over four decades of experience. As INTERPOL’s Director of Cybercrime (2019–2024), he led global operations, strengthened cyber resilience, and disrupted transnational criminal networks. Craig expanded INTERPOL’s Global Cybercrime Programme, fostering real-time cooperation across its 196 member countries and addressing emerging digital threats through innovative operational models. He also played a pivotal role in INTERPOL’s contributions to international cybercrime negotiations, including the UN Ad Hoc Committee on Cybercrime and OEWG.
Previously, Craig held senior roles in UK law enforcement, focusing on cybercrime at local, regional, and national levels. Since retiring from the National Crime Agency in 2024, he continues to collaborate with industry leaders, academic institutions, and policymakers worldwide. Recognized globally as a thought leader and strategic advisor, Craig is committed to building resilient cyber ecosystems and advancing global efforts to combat cyber threats.




BsidesAth Speaker

BsidesAth Speaker

Talk #1

Talk 1 TBA

by Speaker 1a, Speaker 1b  @Twitter1a  @Twitter1b

Abstract: Speaker Abs

Bio: Speaker a

Bio: Speaker b




BsidesAth Speaker

Talk #2

Talk 2 TBA

by Speaker 2  @Twitter

Abstract: Speaker 2 Abs

Bio: Speaker 2 Bio




BsidesAth Speaker

Talk #3

Talk 3 TBA

by Speaker 3  @Twitter

Abstract: Speaker 3 Abs

Bio: Speaker 3 Bio




BsidesAth Speaker

Talk #4

Talk 4 TBA

by Speaker 4  @Twitter

Abstract: Speaker 4 Abs

Bio: Speaker 4 Bio




BsidesAth Speaker

Talk #5

Talk 5 TBA

by Speaker 5  @Twitter

Abstract: Speaker 5 Abs

Bio: Speaker 5 Bio




BsidesAth Speaker

Talk #6

Talk 6 TBA

by Speaker 6  @Twitter

Abstract: Speaker 6 Abs

Bio: Speaker 6 Bio




BsidesAth Speaker

Talk #7

Talk 7 TBA

by Speaker 7  @Twitter

Abstract: Speaker 7 Abs

Bio: Speaker 7 Bio




BsidesAth Speaker

Talk #8

Talk 8 TBA

by Speaker 8  @Twitter

Abstract: Speaker 8 Abs

Bio: Speaker 8 Bio




BsidesAth Speaker

Talk #9

Talk 9 TBA

by Speaker 9  @Twitter

Abstract: Speaker 9 Abs

Bio: Speaker 9 Bio




BsidesAth Speaker

Talk #10

Talk 10 TBA

by Speaker 10  @Twitter

Abstract: Speaker 10 Abs

Bio: Speaker 10 Bio




BsidesAth Speaker

Talk #11

Talk 11 TBA

by Speaker 11  @Twitter

Abstract: Speaker 11 Abs

Bio: Speaker 11 Bio




BsidesAth Speaker

Talk #12

Talk 12 TBA

by Speaker 12  @Twitter

Abstract: Speaker 12 Abs

Bio: Speaker 12 Bio




BsidesAth Speaker

Talk #13

Talk 13 TBA

by Speaker 13  @Twitter

Abstract: Speaker 13 Abs

Bio: Speaker 13 Bio




BsidesAth Speaker

Talk #14

Talk 14 TBA

by Speaker 14  @Twitter

Abstract: Speaker 14 Abs

Bio: Speaker 14 Bio




BsidesAth Speaker

Talk #15

Talk 15 TBA

by Speaker 15  @Twitter

Abstract: Speaker 15 Abs

Bio: Speaker 15 Bio




BsidesAth Speaker

Talk #16

Talk 16 TBA

by Speaker 16  @Twitter

Abstract: Speaker 16 Abs

Bio: Speaker 16 Bio




BsidesAth Speaker

Talk #17

Talk 17 TBA

by Speaker 17  @Twitter

Abstract: Speaker 17 Abs

Bio: Speaker 17 Bio




BsidesAth Speaker

Talk #18

Talk 18 TBA

by Speaker 18  @Twitter

Abstract: Speaker 18 Abs

Bio: Speaker 18 Bio




BsidesAth Speaker

Talk #19

Talk 19 TBA

by Speaker 19  @Twitter

Abstract: Speaker 19 Abs

Bio: Speaker 19 Bio




BsidesAth Speaker

Talk #20

Talk 20 TBA

by Speaker 20  @Twitter

Abstract: Speaker 20 Abs

Bio: Speaker 20 Bio




BsidesAth Speaker

Talk #21

Talk 21 TBA

by Speaker 21  @Twitter

Abstract: Speaker 21 Abs

Bio: Speaker 21 Bio




BsidesAth Speaker

Talk #22

Talk 22 TBA

by Speaker 22  @Twitter

Abstract: Speaker 22 Abs

Bio: Speaker 22 Bio




BsidesAth Speaker

Talk #23

Talk 23 TBA

by Speaker 23  @Twitter

Abstract: Speaker 23 Abs

Bio: Speaker 23 Bio




BsidesAth Speaker

BsidesAth Speaker

Workshop #1

WS1 TBA

by WS 1a, WS 1b  @Twitter  @Twitter

Abstract: WS1 Abs

Bio: WS 1a Bio

Bio: WS 2b Bio




BsidesAth Speaker

Workshop #2

WS2 TBA

by Speaker WS2  @Twitter

Abstract: WS2 Abs

Bio: WS2 Bio




BsidesAth Speaker

Workshop #3

WS3 TBA

by Speaker WS3  @Twitter

Abstract: WS3 Abs

Bio: WS3 Bio




BsidesAth Speaker

Workshop #4

WS4 TBA

by Speaker WS4  @Twitter

Abstract: WS4 Abs

Bio: WS4 Bio




BsidesAth Speaker

BsidesAth Speaker

BsidesAth Speaker

Special Ses. #1

Paint it... Purple: Wireless Security at the Operating Table. A workshop not for the Faint-of-Heart

by D.Georgiou, K. Kiriakos, S.Pitikaris  @Twitter  @Twitter  @Twitter

Abstract: This hands-on workshop explores offensive (Red Team) and defensive (Blue Team) wireless security techniques, culminating in a Purple Team approach for proactive defense. Through live demonstrations of Wi-Fi attacks (e.g., WPA2 cracking, Evil Twin) and countermeasures (WIDS/WIPS, secure configurations), participants will gain practical skills to enhance cybersecurity posture and mitigate evolving wireless threats.
Learning Outcomes
• Master Wireless Attack Techniques: Participants will learn to identify, scan, and exploit wireless network vulnerabilities by capturing WPA2 handshakes and setting up rogue access points using industry-standard tools like Aircrack-ng, Wifite, Kismet, Bettercap, WiFi Pineapple etc..
• Build Robust Wireless Defenses: Attendees will gain hands-on skills to configure secure Wi-Fi setups (e.g., WPA3, Enterprise 802.1x authentication, MFA and strong encryption, Walled Garden Guest portals) and deploy detection/prevention strategies (WIDS/WIPS and hardening) to counter attacks like Evil Twins and unauthorized access attempts.
• Apply Purple Team Synergy: Participants will understand how to bridge Red and Blue Team efforts, using attack insights to enhance defensive measures and foster a proactive, collaborative approach to wireless security.
Notes for Participants
The instructors will provide a detailed handout to guide you through the session. Expect:
• A list of tools (Aircrack-ng, Kismet, Bettercap) with download links and setup instructions for the Kali Linux lab.
• Step-by-step guides for key demos: capturing a WPA2 handshake, launching an Evil Twin attack, and configuring a secure router.
•  Online resources for further exploration (e.g., WPA3 specs, WIDS/WIPS tools).
•  Log analysis tips and sample configs to spot and stop wireless threats.

Bio: Dimitris GEORGIOU is a senior consultant with more than 20 years of experience in IT and Cybersecurity. He is Chief Security Officer and Partner at Alphabit Cybersecurity, a cybersecurity firm in Athens, Greece. He has diverse studies in the humanities and Computer Science and holds professional certifications in Information Security, Digital Forensics and Payment Security. He is member of BCS, IEEE, ACM and ISC2. He participates at the ISC2 Chapter Advisory Committee and volunteers as a Member of the Audit Committee of the ISC2 Hellenic Chapter and the BCS Hellenic Section. He consults organizations on how to effectively reduce cyber risk, conducts security audits and digital forensics investigations. He is a registered Judicial Expert, and Negotiator for the Athens Chamber of Commerce and Industry on cases pertaining to digital technologies.

Bio: Konstantinos KIRIAKOS, a computer science engineering graduate, transitioned from the world of software development to pursue his dream in Cybersecurity. Drawn to the intricate challenges and complexities of Cybersecurity, he embarked on this journey by earning the CC certification from ISC2. Today, he specializes in diverse areas like digital forensics, penetration testing, and consulting. His focus goes beyond identifying vulnerabilities; he actively contributes to evolving organizational defenses in all aspects by building robust security postures and empowering staff through comprehensive training sessions.

Bio: Spiros PITIKARIS is a Cyber Security Consultant and has been a part of Alphabit Cybersecurity for 4 years. With a BSc and Msc in Cyber Security he also holds professional certifications in Information Security, Digital Forensics and Penetration Testing. He combines a passion for the offensive side of cybersecurity with a keen interest in the defensive realms of digital forensics and incident response. His expertise and interests span various technologies, including application security, threat hunting and malware analysis.




BsidesAth Speaker

BsidesAth Speaker

Special Ses. #2

Cyber Security Challenge: Redefining CTFs

by K.Papanagnou, C.Pliatsikas  @Twitter  @Twitter

Abstract: Join us in a cumulative talk around the Cyber Security Challenge Greece. We will explore how we have addressed outreach challenges and enhanced the CTF experience with our real-life scenario CTF approach, moving away from the traditional Jeopardy style. Additionally, we will examine trends in participant preferences based on skill levels, as well as provide a walkthrough of the scenarios presented in the 2025 edition.

Bio: Konstantinos is a Senior Penetration Tester at NVISO Security and the Technical Director of the Cyber Security Challenge Greece.

Bio: Christopher is a former NVISO Expert Security Engineer, currently working as an ICS/OT Cyber Security Engineer at Powerfactors. He is a Linux enthusiast, an LPI-approved Instructor, and a strong advocate for FOSS. Passionate about home lab projects, he continuously explores and experiments with new technologies. On the academic side, he holds an MSc in Cyber Security and is currently pursuing a second MSc in Computer Networks & IoT. He has earned several certifications, including GCIH, GDSA, GICSP, LPIC-3 Security, CCSK, and CCNA, among others.




BsidesAth Speaker

Special Ses. #3

Special Session3 TBA

by Speaker Special Session3  @Twitter

Abstract: SpSe3 Abs

Bio: SpSe3 Bio




BsidesAth Speaker

Special Ses. #4

Special Session4 TBA

by Speaker Special Session4  @Twitter

Abstract: SpSe4 Abs

Bio: SpSe4 Bio




BsidesAth Speaker

BsidesAth Speaker

Pre Event #1

PreEvent1 TBA

by PrEv1a, PrEv1b  @Twitter  @Twitter

Abstract: PrEv1 Abs

Bio: PrEv1a Bio

Bio: PrEv1b Bio




BsidesAth Speaker

Pre Event #2

PreEvent2 TBA

by Speaker PreEvent2  @Twitter

Abstract: PrEv2 Abs

Bio: PrEv2 Bio




BsidesAth Speaker

Pre Event #3

PreEvent3 TBA

by Speaker PreEvent3  @Twitter

Abstract: PrEv3 Abs

Bio: PrEv3 Bio




BsidesAth Speaker

Pre Event #4

PreEvent4 TBA

by Speaker PreEvent4  @Twitter

Abstract: PrEv4 Abs

Bio: PrEv4 Bio




BsidesAth Speaker

Pre Event #5

PreEvent5 TBA

by Speaker PreEvent5  @Twitter

Abstract: PrEv5 Abs

Bio: PrEv5 Bio




BsidesAth Speaker

Pre Event #6

PreEvent6 TBA

by Speaker PreEvent6  @Twitter

Abstract: PrEv6 Abs

Bio: PrEv6 Bio




Network

Educate

Participate