Adventures in Android Forensics - Artifacts From an Alternative Dating App
After Party
A Pretty Sweet Presentation: How To (Maybe Not) Honeypot
Attacking single factor authentication in web apps and Windows: The easiest way in is still through the front door.
Building a CTF Team
Cirque du Security© (How to be the Ringmaster)
Creating a Stronger Community by Poisoning Your Own Well
Extending BloodHound for Red Teamers
Getting Started in Amateur Radio
Institutional Cybersecurity Preparedness: Trends and Best Practices
Intro CTF
Introduction to Defining TTPs From Incident Data
Kicking Cuckoo Out Of the Nest
Knowing the right code for your resume
Let's Play with Shodan: Scanning the IoT
Mitigating InfoSec Burnout and Imposter Syndrome: n00b survival guide
Navigating Your Career Search
Purple Train: Building a Red and Blue Training Lab
Python Network Programming and Encryption
Ransomware Redux
Resume Tips, Tricks, and Reviews
Security, Not So SIEMple
Sponsors, CTF, Lockpick Village
Starting out with OpenStack
The Pi in the Sky Could be a Spy
“This is how I talk” – Why soft skills are no longer an option
Trends in malware distribution
TurboTalks
Who am I? I’m Captain Jack Sparrow: A Tale of a First Time Captain
Yes Dorthy, the ‘Cloud’ can be secure - Secure by design in a public cloud.