Building An Information Security Awareness Program from Scratch
Malware : testing malware scenarios on your network
Password Intelligence Project – Advanced Password Recovery and Modern Mitigation Strategies
Tizen Security: Hacking the new mobile OS
RAWR – Rapid Assessment of Web Resources
Decoding Bug Bounty Programs
Patching Windows Executables with the Backdoor Factory
DEF CON Documentary
Panel: Building and Growing a Hacker Space
SO Hopelessly Broken: the implications of pervasive vulnerabilities in SOHO router products.
Put Me In Coach: How We Got Started In Infosec
Alice Goes Deeper (Down the Rabbit Hole) – Redirection 2.0
Emergent Vulnerabilities: What ant colonies, schools of fish, and security have in common.
Why Your IT Bytes
Using Facial Recognition Software In Digital Forensics And Information Security
How to Fight a War Without Actually Starting One
Crypto-Exploit Exercises: A tool for reinforcing basic topics in Cryptography