Arming Small Security Programs: Network Baseline Generation and Alerts with Bropy
Automating Bulk Intelligence Collection
Binary Reverse Engineering for Beginners
Bro Crash Course
BSidesCharm Party
Clean up on Aisle APT
Closing Ceremony
Current State of Virtualizing Network Monitoring
Dead Box...not Dead Body
Detecting the Elusive: Active Directory Threat Hunting
Effective YARA
Frony Fronius - Exploring Zigbee signals from Solar City
Imposter Syndrome: I Don't Feel Like Who You Think I Am.
IoT Pressure Cooker What Could Go Wrong
IoT Village
Keynote: SOC Panel
Meet the Sponsors / Hiring Village
Microsoft Patch Analysis for Exploitation
OPSEC for the Security Practictioner
OSINT For Pen Testers: Maximizing Your Efficiency
Prizes and Giveaways
Red Teaming the Board
Saturday Keynote
Sunday Keynote
Teaching Evil
The AVATAR Project and You
The Battle for OSINT – Are you Team GUI or Team Command Line?
The Cryptography of Edgar Allan Poe
The Network Sorcerer's Workbench
The Not So Same-Origin Policy
Threat Hunting - Thinking About Tomorrow
Understanding the Cybersecurity Act of 2015
Weaponizing Splunk: Using Blue Teams for Evil