2nd Annual - CryptKids Con at BSidesDC
Abusing Windows with PowerShell and Microsoft debuggers in user-land and kernel-land
Act and Think like an Epidemiologist to Combat Digital Diseases
Adversarial Post-Exploitation: Lessons From The Pros
A Hacker's Guide to Usability Testing
A Notional Framework for applying Antifragile thinking to the RMF -- Growing stronger through compromise
Applying data science to identify malicious actors in enterprise logs
Attacking Patient Health: The Anatomy of Hospital Exploitation
Beyond Automated Testing
Binary Reverse Engineering for Beginners
Bro Crash Course
BSidesDC After Party sponsored by Altus Consulting Corporation
Building Blocks: The Security Analyst's Toolbox
Closing Remarks
CryptKids Keynote
Cyber Threats and Russian Information and Electronic Warfare
Detecting Malicious websites using Machine Learning
How to Join the Infosec Community
I got a shell... now where's the Power
Keynote
"Knowing the Enemy"- Creating a Cyber Threat Actor Attribution Program
Lockpick Village / IoT Village - Saturday
Lockpick Village / IoT Village - Sunday
Palo Alto Networks -- Advanced Endpoint Protection Ultimate Test Drive
PowerShell Security: Defending the Enterprise from the Latest Attack Platform
Practical Cyborgism: Getting Start with Machine Learning for Incident Detection
Registration - Friday
SANS NetWars Tournament
Tales from the Crypt...(analyst)
Tales of Fails and Tools for Message Integrity
Tipping the Scales Back In Our Favor
Users and Cloud Collide: Understanding Threat Vectors in the Enterprise Cloud Environment
Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk
WCTF Magic as told by a clumsy Magician
Welcome
We Should Talk About This: Data Security as an Issue for Communication Research
What's the Big Deal with Assessing ICS/SCADA?
Wireless Capture the Flag (WCTF) - Saturday
Wireless Capture the Flag (WCTF) - Sunday
YAYA (Yet Another YARA Allocution)