Hacking the Hustle Hands-On, Infosec Resume and Career Strategies
Opening Keynote -- Beyond Good and Evil: Towards Effective Security
SHA-1 backdooring and exploitation
Evading code emulation: Writing ridiculously obvious malware that bypasses AV
Security Management Without the Suck
Vulnerability Assessments on SCADA: How i 'owned' the Power Grid.
Malware Analysis 101 - N00b to Ninja in 60 Minutes
Travel Hacking With The Telecom Informer
You Hack, We Capture: Attack Analysis with Honeypots
The untold story about ATM Malware
Using Superpowers for Hardware Reverse Engineering
Why am I surrounded by friggin' idiots?!? (Because you hired them!)
Demystiphying and Fingerprinting the 802.15.4/ZigBee PHY
Insider Threat Kill Chain: Human Indicators of Compromise
A Place to Hang Our Hats: Security Community and Culture
Booze, Devil's Advocate, and Hugs: the Best Debates Panel You'll See at BSidesLV 2014
Pwning the Pawns with WiHawk
Closing Keynote