• Wednesday, August 3
  • Boyd's OODA and General Predator/Prey theory

    Tim Keanini
    Wed, 10:30 - 11:30
    Track 1 - Track 1
  • Are There Still Wolves Among Us?

    Val Smith
    Wed, 11:30 - 12:30
    Track 1 - Track 1
  • Using the Teensy for so much more...

    Joshua Kelley, David Kennedy
    Wed, 12:30 - 13:30
    Track 1 - Track 1
  • Vulnerability Research Circa 1851

    Schuyler Towne
    Wed, 13:30 - 14:30
    Track 1 - Track 1
  • Pentultimate Hack - Manipulating Layers 8 & 9 of the OSI Model (Management & Budget)

    Rafal Los
    Wed, 14:30 - 15:30
    Track 1 - Track 1
  • Hacking Google Chrome OS

    Matt Johansen, Kyle Osborne
    Wed, 15:30 - 16:30
    Track 1 - Track 1
  • UDID pwnage (0day for iOS)

    Aldo Cortesi
    Wed, 16:30 - 17:30
    Track 1 - Track 1
  • Thursday, August 4
  • Walking the Green Mile: How to Get Fired After a Security Incident

    Brian Baskin
    Thu, 10:30 - 11:30
    Track 1 - Track 1
  • Cyber Fast Track

    Peiter Zatko
    Thu, 11:30 - 12:30
    Track 1 - Track 1
  • Long Beard's Guide to Exploit Dev

    Bannedit, egyp7
    Thu, 12:30 - 13:30
    Track 1 - Track 1
  • Siemens / SCADA 0day

    Dillon Beresford
    Thu, 13:30 - 14:30
    Track 1 - Track 1
  • Advanced data exfiltration - the way Q would have done it

    Iftach Ian Amit
    Thu, 14:30 - 15:30
    Track 1 - Track 1
  • Something Awesome™

    HD Moore
    Thu, 15:30 - 16:30
    Track 1 - Track 1
  • How to pass audits with non-compliant systems

    Jay, Shane
    Thu, 16:30 - 17:30
    Track 1 - Track 1