-
Welcome & Opening Remarks
- BSides Dublin
-
SaaSquatch Hunters:
Threat Detection In The Wild Of SaaS
- Julie Agnes Sparks
-
When SSL Fails: Tracing the SSL vuln
to the most shocking real world impacts
- Michelle Simpson
-
Threat Modeling Meets Model Training:
Web App Security Skills for AI
- Breanne Boland
-
Right to Repair: Tractors, Hackers, And Property Rights
- Ciaran Conliffe
-
Hackers with Radios:
Security and the Physical Layer
- Mark Megarry
-
Tinker Tailor LLM Spy: Investigate & Respond to
Attacks on GenAI Chatbots
- Allyn Stott
-
From Quantum Threats to Quantum Shields
A Comprehensive Guide to Post-Quantum Cryptography
- Panagiotis (Panos) Vlachos
-
Dungeons & Dragons:
The security tool you didn't know you needed
- Klaus Agnoletti
-
The Human Factor: Quantifying Human Risk
- Sara Anstey
-
I Am Not Who I Am: Bypassing Biometric
Authentication Systems
- Oluwasefunmi Alabi
-
You Shall Not Pass! (Without Proper Attribution):
Untangling a Complex Attribution Case
- Asli Koksal
-
Exploiting the Web with Charsets
- Cillian Collins
-
A Deep Dive into the Triad Nexus Pig Butchering
& Money Laundering Network
- Kasey Best and Zach Edwards
-
Death by Metrics:
How Numbers Can Kill Your Security
- Valentine Mairet
-
Managing AI Effectively: A Practical Guide Using
NIST AI Risk Management Framework
- Stefania Lauciello
-
One Bug, Two Bug, Red Bug, Blue Bug
- Lea Snyder and Patrick Fitzgerald
-
Is Your Phone Spying on You? An In-Depth
of Vulnerabilities in Cisco VoIP Phones
- Balazs Bucsay
-
Attacking LLM Detectors with Homoglyph-Based Attacks
- Aldan Creo
-
Weaponized Open-Source Applications:
Real-Life Cyberattack Scenarios
- Juho Jauhiainen
-
Performing a 0-click Token Heist in
Microsoft Teams Meetings
- Evan Grant
-
Gotta Escape 'Em All - Can We Exploit RCE in a GBA
Emulator For Fun and Profit?
- Rebecca Martin
-
Detecting Threats at Hyperscale:
My Journey and Lessons from Google's Front Lines
- Domagoj Klasic
-
Is malware getting smarter?
Exploring AI-driven threats and solutions
- Candid Wuest
-
Start covering your bases & Stop chasing APT headlines
- Avishay Zawoznik
-
Breaching a Bank: Mission Impossible Style
- Ridhwan Roshan
-
The Pitfalls of Poor Remediation:
How Companies Sabotage Incident Response Efforts
- Giorgio Perticone
-
Restless Guests: From Subscription to Backdoor Intruder
- Simon Maxwell-Stewart
-
The Digital Deception:
Unveiling the Risks of 'Kid-Safe' Phones
- Katie Colgan
-
Demistifying the First Few Minutes After
Compromising a Container
- Stuart McMurray
-
Locknote: On (Un)Natural Selection:
The Evolution of Malware
- Lena Yu
-
Closing Remarks
- BSides Dublin