“Puff, Puff, Pass: Getting the Most Out of Your Hash” An Intro to Linux Post-Exploitation Fun With Windows Hashes
Building Security into your Mobile Application
Flex Your Rights: The Constitution & Political Activism in the Hacker Community
The Future of RE: Dynamic Binary Visualization
ISO8583: How to pentest when given a target that is not your “normal” target.
Android in the Healthcare Workplace: A Case Study
Social Engineering Defense Contractors on LinkedIN & Facebook: Who’s plugged in to your employees?
Moar Anti-Forensics – Moar Louise
Penetration Testing from a Hot Tub Time Machine
Social Zombies: Rise of the Mobile Dead
Nice to Meet You
Introduction to Metasploit Post Exploitation Modules
The Evolution of HFC
Security Epistemology: Beliefs, Truth, and Knowledge in the Infosec Community
Tactical Surveillance: Look at me now!
It’s Not Your Perimeter, It’s You That Sucks!
Next Generation Web Reconnaissance
Running a successful Red Team
Pwned in 60 Seconds, From Network Guest To Windows Domain Admin
Pen Testing Security Vendors
How to create a one man SOC
Format String Vulnerabilities 101
Managed Service Providers: Pwn One and Done
CounterSploit! (MSF as a defense platform)
Simple Security Defense to Thwart an Army of Cyber Ninja Warriors
Building the Next Generation IDS with OSINT
A Fool’s Game: Building an Awareness & Training Program
Information Overload, Future Shock, IBM & The Nature of Modern Crime
Off-Grid Communications with Android: Meshing the Mobile World
Beyond Strings – Memory Analysis during Incident Response
RfCat: subghz or bust!
Pentesting iOS Applications
Vulnerability Spidey Sense – Demystifying Pen Testing Intuition
Security Vulnerability Assessments – Process and Best Practices
Ma and Pa Sleep with the Door Unlocked: A Look at Information Security in the Small Business
Medical Device Security: Current State of the Art
Introducing the Smartphone Pentest Framework
Creating A Powerful User Defense Against Attackers
Everything you wanted to know about Academia (But were too afraid to ask)
So you got yourself an InfoSec Manager job. Great! Now what?
We go in over the phone lines, pop the firewall, drop in the hydra and wait for the money” and other movie lines that fail.
Breaking into Security
The Badmin project: (Na-na-nanana Na-na-nanana BADMIN)
Hunting Evil
What locksport can teach us about security
4140 Ways Your Alarm System Can Fail
Are You HIPAA to the Jive?: How Focus on HIPAA Compliance Over Better Security Practices Hurts Us All
Physical Drive-By Downloads
Security Onion: Network Security Monitoring in Minutes
Exploit Development with Ruby – An Intro
SH5ARK ATTACK- taking a byte out of HTML5!
An Introduction to Reverse Engineering with Ida Pro Free
Doxing and Anti-Doxing: Information Reconnaissance for the Stalker and the Stalked
Party (until 1 am)