• Wednesday, August 3
  • Macs in the Age of the APT

    Tom Daniels, Aaron Grattafiori, Alex Stamos
    Wed, 10:00 - 11:00
    Augustus III + IV - Threat Intel
  • Weapons of Targeted Attack: Modern Document Exploit Techniques

    Ming-chieh Pan, Sung-Ting Tsai
    Wed, 11:15 - 12:30
    Augustus III + IV - Threat Intel
  • The Rustock Botnet Takedown

    Julia Wolf
    Wed, 13:45 - 15:00
    Augustus III + IV - Threat Intel
  • Tamper Evident Seals - Design and Security

    datagram
    Wed, 15:15 - 16:30
    Augustus III + IV - Threat Intel
  • Aerial Cyber Apocalypse: If we can do it... they can too.

    Richard Perkins, Mike Tassey
    Wed, 16:45 - 18:00
    Augustus III + IV - Threat Intel
  • Thursday, August 4
  • Virtualization under attack: Breaking out of KVM

    Nelson Elhage
    Thu, 10:00 - 11:00
    Augustus III + IV - Enterprise Concerns
  • Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers

    Michael Sutton
    Thu, 11:15 - 12:30
    Augustus III + IV - Enterprise Concerns
  • Inside Apple's MDM Black Box

    David Schuetz
    Thu, 13:45 - 15:00
    Augustus III + IV - Enterprise Concerns
  • A Crushing Blow At The Heart of SAP J2EE Engine

    Alexander Polyakov
    Thu, 15:15 - 16:30
    Augustus III + IV - Enterprise Concerns
  • Hacking and Forensicating an Oracle Database Server

    David Litchfield
    Thu, 16:45 - 18:00
    Augustus III + IV - Enterprise Concerns