Speakers |
Talk |
Video |
Slides |
Tracy Z. Maleeff |
Keynote: Long Overdue: Making InfoSec Better Through Library Science |
|
|
Julie Agnes Sparks |
SaaSquatch Hunters: Threat Detection in the Wild of SaaS |
|
|
Breanne Boland |
Threat Modeling Meets Model Training: Web App Security Skills for AI |
|
|
Ciaran Conliffe |
Right To Repair: Tractors, Hackers, And Property Rights |
|
|
Michelle Simpson |
When SSL Fails: Tracing the SSL vuln to the most shocking real world impacts |
|
|
Mark Megarry |
Hackers with Radios: Security and the Physical Layer |
|
|
Allyn Stott |
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots |
|
|
Panagiotis (Panos) Vlachos |
From Quantum Threats to Quantum Shields - A Comprehensive Guide to Post-Quantum Cryptography |
|
|
Klaus Agnoletti |
Dungeons & Dragons: The security tool you didn’t know you needed |
|
|
Sara Anstey |
The Human Factor: Quantifying Human Risk |
|
|
Oluwasefunmi Alabi |
I Am Not Who I Am: Bypassing Biometric Authentication Systems |
|
|
Asli Koksal |
You Shall Not Pass! (Without Proper Attribution): Untangling a Complex Attribution Case |
|
|
Cillian Collins |
Exploiting the Web with Charsets |
|
|
Kasey Best & Zach Edwards |
Exploit Prediction Scoring System (EPSS) - The User Guide |
|
|
Valentine Mairet |
Death by Metrics: How Numbers Can Kill Your Security |
|
|
Stefania Lauciello |
Managing AI Effectively: A Practical Guide Using NIST AI Risk Management Framework |
|
|
Lea Snyder Patrick Fitzgerald |
One Bug, Two Bug, Red Bug, Blue Bug |
|
|
Balazs Bucsay |
Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones |
|
|
Aldan Creo |
Attacking LLM Detectors with Homoglyph-Based Attacks |
|
|
Juho Jauhiainen |
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios |
|
|
Evan Grant |
Performing a 0-click Token Heist in Microsoft Teams Meetings |
|
|
Rebecca Martin |
Gotta Escape 'Em All - Can We Exploit RCE in a GBA Emulator For Fun and Profit? |
|
|
Domagoj Klasic |
Detecting Threats at Hyperscale: My Journey and Lessons from Google's Front Lines |
|
|
Candid Wuest |
Is malware getting smarter? Exploring AI-driven threats and solutions |
|
|
Avishay Zawoznik |
Start covering your bases & Stop chasing APT headlines |
|
|
Ridhwan Roshan |
Breaching a Bank: Mission Impossible Style |
|
|
Giorgio Perticone |
The Pitfalls of Poor Remediation: How Companies Sabotage Incident Response |
|
|
Simon Maxwell-Stewart |
Restless Guests: From Subscription to Backdoor Intruder |
|
|
Katie Colgan |
The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones |
|
|
Stuart McMurray |
Demystifying the First Few Minutes After Compromising a Container |
|
|
Lena Yu |
Locknote: On (Un)Natural Selection: The Evolution of Malware |
|
|
Klaudia Obieglo |
Rookie Talk: Security as a Product Feature (Not a Burden) |
|
|
Svitlana Samko |
Rookie Talk: Decoding the Human Firewall: The Psychology Behind Social |
|
|
Poorna Vettiparampil Damodaran |
Rookie Talk: IoT/Embedded Device Security |
|
|
Aleksa Zatezalo |
Rookie Talk: What's Old is New: Vulnerabilities in GraphQL |
|
|
Caoimhe Tiernan |
Rookie Talk: Irish SMEs are tired, scared and confused about Cybersecurity. What do we do? |
|
|