Abusing Webhooks for Command and Control
Accessibility: A Creative Solution to Living Life Blind
A Day in the Life of a Product Security Incident Response Manager
Advanced Wireless Attacks Against Enterprise Networks
All The Sales President’s Men
Applied OSINT: Enabling Better Social Engineering for Better Pen Tests
Ask the EFF
A System Dynamics Approach to CNO Modelling
Auditing Of IoT Devices
Automating Crypto Bugs Discovery
Baby Got Hack Back
Banking on Insecurity: The ongoing fairytale of securing financial institutions
Behavioral Analysis from DNS and Network Traffic
Breaking the Fourth Wall - Hacking a 50 years old myth
Building a Benign Data Set
Cash in the aisles: How gift cards are easily exploited
CheckPlease - Payload-Agnostic Implant Security
Crams and Exams for Hams
CTF all the things: Leveraging gamification to up your security game
Data visualization in security: Still home of the WOPR?
Deep Learning Neural Networks – Our Fun Attempt At Building One
DefCon DarkNet Badge Hardware And Software: An Introduction To Custom Badge Building
Destructive Malware and Interstate Rivalries: The Evolution of Digital Weapons and Geopolitical Conflict
Effective YARA
Elastic-ing All the Things - Saving anything at elastic stack and having fun with detections
Engineering My Way Into InfoSec
(Even More) Mainframes? On my Internet?
Everything is Not Awesome: How to Overcome Barriers to Proper Network Segmentation
Exploration of Novel Visualizations for Information Security Data
Extreme Mobile Application Exploitation
Feds <3 H4ckers
F! Passwords!
From SOC to CSIRT
Getting insight out of and back into deep neural networks
/.git/ing All Your Data
GO Forth And Reverse
Going Passwordless
Google Apps Scripts Kill Chain
Grappling Hooks on the Ivory Tower: This Year in Practical Academic Research
Hacking College, a Cybersecurity Career, and Certifications
Hacking Is Easy, Hiring Is Hard: Managing Security People
Hacking Office Politics for Cybersecurity Leaders
Hacking Tech Interviews
Hacking the Law: A Call for Action – Bug Bounties Legal Terms as a Case Study
Hacks and Crafts: Improvised Physical Security Tools for Improvised Situations
Hadoop Safari : Hunting For Vulnerabilities
Hands-on OSINT Crash Course for Hackers
Healthcare in Critical Condition
HHS Task Force (Panel)
Hidden Hot Battle Lessons of Cold War: All Learning Models Have Flaws, Some Have Casualties
How I Scanned The Internet For NSA Compromised Firewalls
How To Accidentally Get A Job In InfoSec.
How to escalate privileges to administrator in latest Windows.
How To Hack Recruiting: Turning the Tables (Panel)
How To Lose Friends and Influence People (An Apology)
How to make metrics and influence people
How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches
How To Respond To Cops Who Want Your Passwords
IATC Closing
IATC Cyber Crisis Simulation
IATC Kickoff
IATC Mock Congressional Hearing
I Club and So Can You
I got more games than Milton Bradley: Incentivize a positive change in your security culture
IMSI Catchers And The Happy Yellow Helicopter: Security Challenges At Standing Rock
Industrial Control System Network Analysis
(In)Outsider Trading - Hacking stocks using public information and influence.
Inside MormonLeaks: the why, the how, and the what
Internet of Cars
Interrogation Techniques for Fun and Profit: Designing better tools for your SOC team
Introduction to Reversing and Pwning
Intro to Practical Network Signature Development for Open Source IDS
Is Data Visualization still necessary?
It’s Not Me, It’s You: How To Be A Better Hiring Manager or Rooting Out Excellent Candidates Despite Themselves
Kick up the Jams
Koadic C3 - Windows COM Command & Control Framework
Lessons from the front lines: New York City Cyber Command
Lightning Talks: Thinking Different
Magical Thinking... and how to thwart it.
Measuring the Use and Abuse of Brain Wallets
Mentoring, Networking, Resume Review
Messing with Forensic Analysts: Modifying VSS Snapshots
Microservices And FaaS For Offensive Security
Minimum Viable Risk Management Program
Mining Software Vulns in SCCM / NIST’s NVD– The Rocky Road to Data Nirvana
Modern Internet-Scale Network Reconnaissance
Navigating the Alternative Facts of Malware Prevention
Network Forensic Analysis in an Encrypted World
One OSINT Tool to Rule Them All
Optimizations for Bitcoin key cracking
Password Cracking 201: Beyond the Basics
Poking bears: Validating the truth from IoCs in attack postmortem reports
Practical Malware Analysis - Hands-On
Protecting Windows Credentials: An Excessive Guide for Security Professionals
Public Policy of Things
Purple Team: How This Color Can Help You And Your Organisation Learn and Get Better
Pwn All The Mobile Porn Apps
Pwning Software-Defined Networking (SDN)
Radio frequencies all around us! What data are you leaking and what is done with it?
Rate the Recruiter
Recruiter Smack Down (Panel)
Red/Blue Q&A: Pressure Test Lightning Talk Ideas
Regulatory Nets vs. The Fishing Hook Of Litigation
Rethinking P@ssw0rd Strength Beyond Brute-force Entropy
Robust Defense for the rest of Us
Safer Storage and Handling of User Answers to Security Questions
Scamming the Scammers - Becoming the Robin Hood of the phones
SECSMASH: Using Security Products to own the Enterprise'
Sex, Secret and God: A Brief History of Bad Passwords
Skip tracing for fun and profit
SniffAir – An Open-Source Framework for Wireless Security Assessments
Something Wicked: Defensible Social Architecture in the context of Big Data, Behavioral Econ, Bot Hives, and Bad Actors
Sympathy for the Developer
Technical Tactics: Embedded Linux Software BOM
Technical Tactics: Fear & loathing in building management systems
The Attack Chain Of A Nation-State (Equation Group)
The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirect Wireless Pivots
The Commoditization of Security Solutions: Will You Be Replaced by a Small Script?
The Human Factor: Why Are We So Bad at Security and Risk Assessment?
The New Cat and Mouse Game: Attacking and Defending Machine Learning Based Software
The Role of Data Visualization in Improving Machine Learning Models
The Struggle Is Real: My Journey With Mental Health Issues
Think Complex Passwords Will Save You?
TMTO...Y?
Transfer Learning: Analyst-Sourcing Behavioral Classification
Two-Factor Auth - Demand Bidirectional
Vaccination - An Anti-Honeypot Approach
What A Career In Public Service Is Really About
Why can't we be friends? (Ask a Fed.)
Why is China all up in my SQL server?
Writing Malware Without Writing Code
YARA-as-a-Service (YaaS): Real-Time Serverless Malware Detection
Your Facts Are Not Safe with Us: Russian Information Operations as Social Engineering
Your model isn't that special: zero to malware model in Not Much Code and where the real work lies
Zero Trust Networks: In Theory and in Practice