Introducting Network-Socut: Defending The Soft Center of Your Network
Open Source Threat Intelligence: Developing a Threat intelligence program using open source tools and public sources
Analyzing Weak Areas of the Federal Cloud Security Program
Surviving until Dawn
Dolla Dolla Bump Key
What Dungeons & Dragons Taught Me About INFOSEC
Getting Windows to Play with Itself: A Pen Tester's Guide to Windows API Abuse
Once upon a time… (InfoSec History 101)
Proactive Application Security
A Bug or Malware? Catastrophic consequences either way.
Gender Differences in Social Engineering: Does Sex Matter?
Introduction to System Hardening
Offensive Safe Words -- Exploiting a Bad Dom(admins’)
Hacking Mainframes; Vulnerabilities in applications exposed over TN3270
Chicken of the APT: Understanding Targeted Attackers with Incubation!
It’s Not Easy Being Purple
Hacking your way into the APRS Network on the Cheap
Building a Web Application Vulnerability Management Program
Protocol Me Maybe? How to Date SCADA
Single Chip Microcontrollers: Beyond Arduino
Bending and Twisting Networks
Control Flow Graph Based Virus Scanning
Fighting Back Against SSL Inspection
Physical Security: From Locks to Dox
Attacks and Countermeasures: Advanced Network Traffic Manipulation
Building Better Botnets with IPv6
Bridging the gap between red and blue
Ok -- so you’ve been pwned -- now what?
Am I an Imposter?
Call of Community: Modern Warfare
What to expect when you’re expecting…a pentest
Bad Advice- Unintended Consequences- and Broken Paradigms
CMS Hacking Tricks
Everybody gets clickjacked: Hard knock lessons on bug bounties
The Canary in the Cloud
Defensive talks NOT 'sexy'? What's sexier than catching an attack like Target- APT- SET or your Pen Tester? Let me show you some sexy logging
Things Being a New Parent of Twins Teaches You About Security
Simple Network Management Pwnd
Advanced Incident Response with Bro
Are you a Beefeater -- focused on protecting your crown jewels?
Closing Ceremonies