Actionable Threat Intelligence: ISIS, SuperBall, SuperFish, and your less magical 8-ball
A deep look into a Chinese advanced attack. Understand it, learn from it and how to detect and defend against attacks like this.
An Adversarial View of SaaS Malware Sandboxes
Anatomy of Black Markets in 2015 -- Strategies and Mitigation
Bridging the Gap: Lessons in Adversarial Tradecraft
Building the Poison Apple Pi
Closing Remarks
Content Security Policy - Lessons learned at Yahoo
Crypt Kids keynote from Alicia Kozakiewicz
Cyber Intent: Cybersecurity
Deductive Reasoning: File Analysis Techniques
Defending Election Campaigns from Cyberspace
Fixing XSS with Content Security Policy
**** It, Do it Live (PowerShell Digital Forensics)
Log All The Things! Proactive Forensics using Log Analysis
Network Reliability Monitoring for ICS -- Going beyond NSM and SIEM
Point-of-Sale to Point-of-Fail
Running Away from Security: How Your Online Information Can Hurt You
Stop Treating Data as Instructions!
The Law of Drones
The New Face of Card Fraud
Welcome
You can't make web app security easy, but you can make it simple