Advanced Targeted Attack.
Alert All the Things! (Network Baselines/Alerts with Bro Scripts)
ArchStrike Linux
Build the capability to Detect, Triage And Respond
Build Your Own Physical Pentesting Go-Bag
Chaining the Future: Blockchains and Security
Closing
Deconstructing 100% JavaScript-based Ransomware
De Falsis Deis: Social Contracts
e-Extortion Trends and Defense
Finding Buried Treasure: The Pirate’s Guide to Job Search
Greeting
Hacking The Sabbath
HIPAA for Infosec Professionals
Honeypots and Live Threat Intelligence
How Cybercrime Became Big Business
Incident Response - No Pain No Gain
Interactive Incident Response
Intro to Fuzzing for Fun and Profit
Keynote: Cyber Security in the Age of Espionage
Lessons from the Field: Governance, Compliance & Security in SharePoint Online
Managing Your MSSP
Mozilla's tips on strong HTTPS
NFC Your Smartphone's Best Friend or Worst Nightmare
Office 365 Security Center Planning Considerations
Phishing Pholks Phor Phun and Prophit
Pirate Booty: Navigating the High Seas to Find Your Career Treasure
Pow Pow Pow Powershell!
Private matters
Propel Your Security Career by Writing Your Own Story
Protecting Third-Party Risk From Plundering
Protecting Visual Assets: Digital Image Counter-Surveillance Strategies
Redefining Security in a Cloud-Centric Future
Resume Review
Securing Agile Development
Securing The Electrical Grid From Modern Threats
The Pirate’s Map: How Not to Bury Treasure in Your Resume
Weaponizing Splunk: Using Blue Team Tools for Evil
What I've Learned Writing CTF Challenges
What the Hell is ICS Security?