Security Bsides Dublin Feedback Survey

- This survey is anonymous and has the sole purpose of helping improve the conference for the local community next year.
- It should take 10 - 15 minutes to complete this survey. The more feedback you provide, the more we can replicate what works and adjust what doesn't for next year.
- Although some of the questions are a little long, all are optional.

Question Title

* 1. Which of the following best describes your involvement with the conference?

Question Title

* 2. Which of the following best describes your career level?

Question Title

* 3. What is your job title?

Question Title

* 4. How would you rate the sessions you attended?
(Skip row if you didn't attend that session)

  Excellent Good Average Below Average Poor N/A
A Deep Dive into the Triad Nexus Pig Butchering & Money Laundering Network [Kasey Best & Zach Edwards]
Attacking LLM Detectors with Homoglyph-Based Attacks [Aldan Creo]
Breaching a Bank: Mission Impossible Style [Ridhwan Roshan]
Death by Metrics: How Numbers Can Kill Your Security [Valentine Mairet]
Demystifying the First Few Minutes After Compromising a Container [Stuart McMurray]
Detecting Threats at Hyperscale: My Journey and Lessons from Google's Front Lines [Domagoj Klasic]
Dungeons & Dragons: The security tool you didn’t know you needed [Klaus Agnoletti]
Exploiting the Web with Charsets [Cillian Collins]
From Quantum Threats to Quantum Shields - A Comprehensive Guide to Post-Quantum Cryptography [Panagiotis (Panos) Vlachos]
Gotta Escape 'Em All - Can We Exploit RCE in a GBA Emulator For Fun and Profit? [Rebecca Martin]
Hackers with Radios: Security and the Physical Layer [Mark Megarry]
I Am Not Who I Am: Bypassing Biometric Authentication Systems [Oluwasefunmi Alabi]
Is malware getting smarter? Exploring AI-driven threats and solutions [Candid Wuest]
Is Your Phone Spying on You? An In-Depth Analysis of Vulnerabilities in Cisco VoIP Phones [Balazs Bucsay]
Locknote: On (Un)Natural Selection: The Evolution of Malware [Lena Yu]
Managing AI Effectively: A Practical Guide Using NIST AI Risk Management Framework [Stefania Lauciello]
One Bug, Two Bug, Red Bug, Blue Bug [Lea Snyder & Patrick Fitzgerald]
Opening Keynote: Long Overdue: Making InfoSec Better Through Library Science [Tracy Z. Maleeff]
Performing a 0-click Token Heist in Microsoft Teams Meetings [Evan Grant]
Restless Guests: From Subscription to Backdoor Intruder [Simon Maxwell-Stewart]
Right To Repair: Tractors, Hackers, And Property Rights [Ciaran Conliffe]
Rookie Talk: Decoding the Human Firewall: The Psychology Behind Social Engineering Attacks [Svitlana Samko]
Rookie Talk: IoT/Embedded Device Security [Poorna Vettiparampil Damodaran]
Rookie Talk: Irish SMEs are tired, scared and confused about Cybersecurity. What do we do? [Caoimhe Tiernan]
Rookie Talk: Security as a Product Feature (Not a Burden) [Klaudia Obieglo]
Rookie Talk: What's Old is New: Vulnerabilities in GraphQL [Aleksa Zatezalo]
SaaSquatch Hunters: Threat Detection in the Wild of SaaS [Julie Agnes Sparks]
Start covering your bases & Stop chasing APT headlines [Matan Mittelman]
The Digital Deception: Unveiling the Risks of 'Kid-Safe' Phones [Katie Colgan]
The Human Factor: Quantifying Human Risk [Sara Anstey]
The Pitfalls of Poor Remediation: How Companies Sabotage Incident Response Efforts [Giorgio Perticone]
Threat Modeling Meets Model Training: Web App Security Skills for AI [Breanne Boland]
Tinker Tailor LLM Spy: Investigate & Respond to Attacks on GenAI Chatbots [Allyn Stott]
Weaponized Open-Source Applications: Real-Life Cyberattack Scenarios [Juho Jauhiainen]
When SSL Fails: Tracing the SSL vuln to the most shocking real world impacts [Michelle Simpson]
Workshop: Client-Side Hacking with Devtools [Ciarán Cotter]
Workshop: Cyber Simulation Exercise [Stuart Davis]
Workshop: Roll Your Own EDR/XDR/MDR [Ken Westin]

Question Title

* 5. How would you rate session timings?

  Just right Too Long Too Short No Preference
Rookie Talk - 10 minutes
Standard Talk - 25 minutes
Extended Talk - 40 minutes
Workshop - 2 hours

Question Title

* 6. Which would you prefer for the conference timings

Question Title

* 7. How many days would you like Security BSides Dublin to be over?

Question Title

* 8. Would you attend Security BSides Dublin next year?

Question Title

* 9. What did you like most about Security BSides Dublin?

Question Title

* 10. What did you like least about Security BSides Dublin?

Question Title

* 11. How would you rate the following elements of Security BSides Dublin?

  Excellent Good Average Below Average Poor N/A
Communications (email / social media)
Website
Quality of speakers / presentations
Village Area
Organisers
Volunteers
Venue
Catering
Signage & directions from volunteers to rooms
Sponsor area
After Party
Event Swag

T