Security BSides Dublin 2025

Speakers

Speakers Talk Video Slides
Tracy Z. Maleeff Keynote: Long Overdue: Making InfoSec Better Through Library Science
Julie Agnes Sparks SaaSquatch Hunters: Threat Detection in the Wild of SaaS
Breanne Boland Threat Modeling Meets Model Training: Web App Security Skills for AI
Ciaran Conliffe Right To Repair: Tractors, Hackers, And Property Rights
Michelle Simpson When SSL Fails: Tracing the SSL vuln to the most shocking real world impacts
Mark Megarry Hackers with Radios: Security and the Physical Layer
Allyn Stott Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots
Panagiotis (Panos) Vlachos From Quantum Threats to Quantum Shields - A Comprehensive Guide to Post-Quantum Cryptography
Klaus Agnoletti Dungeons & Dragons: The security tool you didn’t know you needed
Sara Anstey The Human Factor: Quantifying Human Risk
Oluwasefunmi Alabi I Am Not Who I Am: Bypassing Biometric Authentication Systems
Asli Koksal You Shall Not Pass! (Without Proper Attribution): Untangling a Complex Attribution Case
Cillian Collins Exploiting the Web with Charsets
Kasey Best & Zach Edwards Exploit Prediction Scoring System (EPSS) - The User Guide
Valentine Mairet Death by Metrics: How Numbers Can Kill Your Security
Stefania Lauciello Managing AI Effectively: A Practical Guide Using NIST AI Risk Management Framework
Lea Snyder   Patrick Fitzgerald One Bug, Two Bug, Red Bug, Blue Bug
Balazs Bucsay Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones
Aldan Creo Attacking LLM Detectors with Homoglyph-Based Attacks
Juho Jauhiainen Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios
Evan Grant Performing a 0-click Token Heist in Microsoft Teams Meetings
Rebecca Martin Gotta Escape 'Em All - Can We Exploit RCE in a GBA Emulator For Fun and Profit?
Domagoj Klasic Detecting Threats at Hyperscale: My Journey and Lessons from Google's Front Lines
Candid Wuest Is malware getting smarter? Exploring AI-driven threats and solutions
Avishay Zawoznik Start covering your bases & Stop chasing APT headlines
Ridhwan Roshan Breaching a Bank: Mission Impossible Style
Giorgio Perticone The Pitfalls of Poor Remediation: How Companies Sabotage Incident Response
Simon Maxwell-Stewart Restless Guests: From Subscription to Backdoor Intruder
Katie Colgan The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones
Stuart McMurray Demystifying the First Few Minutes After Compromising a Container
Lena Yu Locknote: On (Un)Natural Selection: The Evolution of Malware
Klaudia Obieglo Rookie Talk: Security as a Product Feature (Not a Burden)
Svitlana Samko Rookie Talk: Decoding the Human Firewall: The Psychology Behind Social
Poorna Vettiparampil Damodaran Rookie Talk: IoT/Embedded Device Security
Aleksa Zatezalo Rookie Talk: What's Old is New: Vulnerabilities in GraphQL
Caoimhe Tiernan Rookie Talk: Irish SMEs are tired, scared and confused about Cybersecurity. What do we do?

Workshops

Workshop  
Roll Your Own EDR/XDR/MDR Ken Westin
Client-Side Hacking with Devtools Ciarán Cotter
Cyber Simulation Exercise Stuart Davis

Sponsors

Sponsor Tier
Google Diamond
State Street Platinum
KPMG Gold
Tenable Silver
Intigriti Silver
Microsoft Silver
Bank of America Silver
Tines After Party
Icon Sustainability
System Bypass