About us
Security BSides Göteborg is a community-driven cybersecurity event that takes place in Gothenburg, Sweden, dedicated to fostering the local cybersecurity community.
Part of the global Security BSides movement, it serves as a platform for cybersecurity enthusiasts, professionals, and researchers to share knowledge, explore new developments, and collaborate on security challenges.
Where Hackers, InfoSec minds, and the cybersecurity community Connect, Hack, Learn, Defend and Evolve together.
Upcoming events
4

AI security challenges and Opportunities for Innovation
·OnlineOnlineAI security challenges and Opportunities for Innovation
AI security challenges and Opportunities for Innovation - Protocols for Authentication and Authorization, Fine grained access control, Agents going rogue, Vibe coding challenges and their solutions
Make sure to register through Zoom Platform vi following link: Registration Link
Make sure to follow BSides Gothenburg on LinkedIn for coming updates.3 attendees
MacOS Forensic Investigation
·OnlineOnlineMacOS Forensic Investigation
The goal of this workshop is to equip participants with the essential knowledge and practical skills needed to perform forensic analysis of macOS systems in the context of modern threats.
Although macOS devices still represent a smaller share of enterprise environments compared to Windows, they are increasingly targeted by threat actors. As a result, macOS security and forensic analysis remain less mature and underrepresented in many organizations’ defensive strategies. Recent industry reports — including findings from Red Canary showing a 400% increase in macOS-related threats between 2023 and 2024 — highlight the urgent need for improved visibility and expertise in this area.
Make sure to register through Zoom Platform vi following link: Registration Link
Learning Objective:
- Creating logical and triage images of macOS devices
- Identifying and interpreting key system artifacts
- Investigating artifacts for evidence of threat actor activity
- Utilizing common forensic tools to support analysis
- Understanding the evolving macOS threat landscape
Make sure to register through Zoom Platform vi following link: Registration Link
Make sure to follow BSides Gothenburg on LinkedIn for coming updates.1 attendee
Agentic AI for Cyber Operations
·OnlineOnlineAgentic AI for Cyber Operations:
In this session we will cover a variety of use cases where AI implementations are helping SOC, CSIRT, and other cyber defender groups. From MCP to multiple Agentic approaches, we'll cover the technical aspects and benefits to both practitioners and leaders.
Make sure to register through Zoom Platform vi following link: Registration Link
Learning Objective:
- Discover multiple AI options for reducing manual effort in cyber operations
- Learn how to build AI tools for alerts and cyber operations teams
- Understand how AI is changing the cyber operations landscape for faster detection
Make sure to register through Zoom Platform vi following link: Registration Link
Make sure to follow BSides Gothenburg on LinkedIn for coming updates.
6 attendees
Securing Agentic AI: Threat trends, OWASP Top 10 patterns and a FinBot CTF demo
·OnlineOnlineSecuring Agentic AI: Threat trends, OWASP Top 10 patterns and a FinBot CTF demo
Make sure to register through Zoom Platform vi following link and grab a seat: Registration Link
Abstract:
Agentic AI systems are moving from chatbots to autonomous workflows that can call tools, access data, write code and take actions across enterprise systems. That shift creates new security boundaries between the user, the agent orchestrator, the model, tools/plugins, memory and sensitive data and introduces failure modes that don’t look like traditional AppSec.
In this session, we’ll walk through the most common Agentic AI security trends and real-world patterns observed in enterprise deployments, mapped to the OWASP Top 10 for Agentic Applications 2026. Rather than a broad survey, we’ll focus on the few risks that most often lead to real impact: unintended tool execution, excessive permissions and weak authorization, prompt/goal manipulation, data exfiltration via tool and retrieval paths, and memory poisoning/persistence risks.
To make these concepts concrete, we’ll introduce a practical reference architecture and a mental model for identifying trust boundaries and control points (identity, policy, validation, isolation and monitoring). We’ll then run a live FinBot CTF demo to show several of these threats in action and discuss how to detect and mitigate them with actionable engineering checklists teams can apply immediately.
Learning Objectives:
- Identify what makes agentic systems security unique
- Recognize high-impact agentic AI attack patterns and map them to the OWASP Top 10 for Agentic Applications
- Apply a reference architecture/metal model to locate control points for prevention and detection
- Observe real exploits and outcomes through a live FinBot CTF demo and understand the attack path
- Take away a practical mitigation checklist for building and operating safer agentic AI systems.
Make sure to register through Zoom Platform vi following link: Registration Link
Make sure to follow BSides Gothenburg on LinkedIn for coming updates.9 attendees
