Security BSides Dublin 2020

Schedule

Workshops

Track One

  Romansh Yadav & Nikhil Srivastava Attacking/defending Android apps training
  Ali Abdollahi OWASP ZAP scripting

Track Two

  Pauline Bourmeau Firmware extraction and analysis with open-source tools
  Thomas Fischer Threat hunting with open-source tools like osquery, elk
Talks
  Registration  
  Introductions  
  Jayson E. Street Keynote
Tea/Coffee Break

Track One

  Jimi Sebree Exploitation of Amazon's Blink security systems
  Sean Metcalf Active Directory, an attacker's perspective
  Jameel Nabbo The scientific art of static code analysis and code review
  Senad Aruc Busting advanced botnets

Track Two

  Chrissi Robertson I'm not a fraud, I promise | Navigating imposter syndrome as an industry newcomer
  Dr Grigorios Fragkos Forward-looking thought Leadership; Cybersecurity Risk Management in 2020+ and the CISO v2.0 op model.
  Jerry Gamblin Building a security team inside a security startup
  Shlomie Liberow Put that cease and desist down: How to train your Org. to work with hackers
Lunch Break

Track One

  Patrick Butterly Working with single sign on - can you just send me the password?
  Michael Burke PhightingPhish
  Greg Thomas Extending SDL to manage third-party vulnerabilities post-release
  Ali Abdollahi New era in telecom hacking

Track Two

  Tj Null From mantra to mindset: Preparing for the OSCP
  Dean O'Neill When intelligence becomes an addiction
  Ciaran Byrne How to social engineer your team of 3l33t H4x0rz
  Argyris Makrygeorgou You son of a breach! aka How to *not* escape the inevitable
Tea/Coffee Break

Track One

  D. Dineen Certificate Enumeration
  Zach Stone & Gaurav Srivastava Proteus: An open-source intelligence collection and analysis platform for actionable product threat Intelligence

Track Two

  Katie Colgan Protecting kids online: Are we doing enough
  Owen O'Connor & Ciaran Kelly Valuing your skills: negotiating and evaluating security roles
  Dave Lewis Locknote
  CTF Winners & Closing Notes  
Afterparty