-
Welcome & Opening Remarks
- BSides Dublin
-
Every Contact Leaves A Trace
- Ken Westin
-
ID.IOT Or… The ID(ea) Of IoT
- Righard Zwienenberg
-
Getting In: Initial Access In 2023
- Tony Gee
-
I’m OK, You’re OK, We’re OK:
Living With AD(H)D In Infosec
- Klaus Agnoletti
-
LAMBDA Malware:
The Hidden Threat In Excel Spreadsheets
- Yonatan Baum and Daniel Wolfman
-
Schrödinger’s Hack: Are Hacktivist Operations
Placing Operational Technology At Risk?
- Daniel Kapellmann Zafra
-
Bypassing Anti-Virus Using BadUSB
- Cristian Cornea
-
Github Actions Security Landscape
- Alex Ilgayev
-
Sniffing Keyboards
(Turns Out Some Of Them Stink)
- Miłosz Gaczkowski
-
Understanding Your Vulnerability Data
To Optimize Your DevOps Pipeline Flow
- Chris Madden
-
The Dark World Of SMS Phishing Kits:
An Insider's Perspective
- Jake Sloane
-
Complexities Of Vulnerability Management:
Strategies For Prioritizing And Remediating Security Holes
- Pablo Ramos
-
Subdomain Hijacking:
Why DevOps Is Making Us More Vulnerable
- Daniel Oates-Lee & Simon Gurney
-
LightBasin: A Roaming Threat
To Telecommunications Companies
- Stuart Davis
-
Containers for Pentesters
- Rory McCune
-
Signatures And Receipts
In The Supply Chain Security
- Ivar Prudnikovas
-
Down The Rabbit Hole Of A
20-Year Long Vulnerability
- Olgierd Pieczul
-
Malware Analysis Of The Poor
- Xavier Mertens
-
Generative AI And ChatGPT Enterprise Risks
- Gadi Evron
-
Closing Remarks And
Presentation Of CTF Prizes
- BSides Dublin