• 2
  • 2011: A Cloud Odyssey

    Davi Ottenheimer
    Wed, 13:30 - 14:30
    Track 2 - Track 2
  • A
  • Advanced data exfiltration - the way Q would have done it

    Iftach Ian Amit
    Thu, 14:30 - 15:30
    Track 1 - Track 1
  • Agnitio: the security code review Swiss army knife. Its static analysis, but not as we know it

    David Rook
    Wed, 12:30 - 13:30
    Track 2 - Track 2
  • All about the Benjamins -- Google's vulnerability reward programs

    Adam Mein
    Wed, 14:30 - 15:30
    Track 2 - Track 2
  • Anti Anti Forensics

    Dave Cowen
    Wed, 15:30 - 16:30
    Track 3 - Track 3
  • Are There Still Wolves Among Us?

    Val Smith
    Wed, 11:30 - 12:30
    Track 1 - Track 1
  • A study of what really breaks SSL

    Ivan Ristic
    Wed, 12:30 - 13:30
    Track 3 - Track 3
  • B
  • Better to burn out than to fade away?

    Joshua Corman, Jack Daniel, Martin McKeay, Gal Shpantzer, Stacy Thayer
    Thu, 15:30 - 16:30
    Track 2 - Track 2
  • Boyd's OODA and General Predator/Prey theory

    Tim Keanini
    Wed, 10:30 - 11:30
    Track 1 - Track 1
  • C
  • Cognitive Intelligence and Network Analysis

    Deepak R. Mahbubani Jr.
    Thu, 12:30 - 13:30
    Track 3 - Track 3
  • Cultural Cues from High Risk Professions

    Gal Shpantzer
    Thu, 13:30 - 14:30
    Track 3 - Track 3
  • Cyber Fast Track

    Peiter Zatko
    Thu, 11:30 - 12:30
    Track 1 - Track 1
  • D
  • Distributed Denial of Service Attacks for Whitehats

    Will Vandevanter
    Wed, 13:30 - 14:30
    Track 3 - Track 3
  • E
  • Exploiting Management For Fun and Profit - or - "Management is not stupid, you are"

    Adam Ely
    Wed, 10:30 - 11:30
    Track 3 - Track 3
  • Exploiting the Hard-Working DWARF

    Sergey Bratus
    Thu, 16:30 - 17:30
    Track 3 - Track 3
  • F
  • Fuck the Penetration Testing Execution Standard (PTES)

    Charlie Vedaa
    Thu, 10:30 - 11:30
    Track 3 - Track 3
  • H
  • Hacking Google Chrome OS

    Matt Johansen, Kyle Osborne
    Wed, 15:30 - 16:30
    Track 1 - Track 1
  • Hacking webapps is more fun when the end result is a shell!

    Joshua D. Abraham
    Thu, 14:30 - 15:30
    Track 2 - Track 2
  • How Government Accountability Conflicts With Citizen Privacy (and Why It's Your Fault)

    Wendy Nather
    Wed, 10:30 - 11:30
    Track 2 - Track 1
  • How (not) to run a Bsides

    Mark Manning, Janice Poulson, Chris John Riley, Jason Ross
    Thu, 16:30 - 17:30
    Track 2 - Track 2
  • How to Hide Your Pr0n

    Orlando Barrera II, Josh Sokol
    Thu, 10:30 - 11:30
    Track 2 - Track 2
  • How to pass audits with non-compliant systems

    Jay, Shane
    Thu, 16:30 - 17:30
    Track 1 - Track 1
  • How to Win Followers and Influence Friends: Hacking Twitter to Boost Your Security Career

    Grecs
    Wed, 16:30 - 17:30
    Track 2 - Track 2
  • I
  • Info Sec Institute: What College Never Will Teach You

    Rick Deacon
    Thu, 14:30 - 15:30
    Track 3 - Track 3
  • InfoSex Sells: The Impact Of The Media And Public Opinion On Security

    Mike Mimoso, MC Petermann, Michelle Shafer, Tim Wilson
    Thu, 13:30 - 14:40
    Track 2 - Track 2
  • L
  • Living the Dream! - Info Sec Style

    James Baker
    Thu, 11:30 - 12:30
    Track 3 - Track 3
  • Long Beard's Guide to Exploit Dev

    Bannedit, egyp7
    Thu, 12:30 - 13:30
    Track 1 - Track 1
  • P
  • Pentultimate Hack - Manipulating Layers 8 & 9 of the OSI Model (Management & Budget)

    Rafal Los
    Wed, 14:30 - 15:30
    Track 1 - Track 1
  • Planes keep falling on my head

    Chris Roberts
    Wed, 11:30 - 12:30
    Track 2 - Track 2
  • S
  • Siemens / SCADA 0day

    Dillon Beresford
    Thu, 13:30 - 14:30
    Track 1 - Track 1
  • Smile for the Grenade! Camera go Bang!

    Vlad Gostom, Joshua Marpet
    Wed, 15:30 - 16:30
    Track 2 - Track 2
  • Something Awesome™

    HD Moore
    Thu, 15:30 - 16:30
    Track 1 - Track 1
  • Sounds Like Botnet

    Itzik Kotler
    Wed, 14:30 - 15:30
    Track 3 - Track 3
  • T
  • Tell Me Your Secrets - Tales of Social Engineering and The Human Mind

    Steven F. Fox
    Wed, 16:30 - 17:30
    Track 3 - Track 3
  • THE 99¢ HEART SURGEON DILEMMA (How to fix penetration testing.)

    Stefan Friedli
    Thu, 15:30 - 16:30
    Track 3 - Track 3
  • Transparent Botnet Command and Control for Smartphones over SMS

    Georgia Weidman
    Thu, 11:30 - 12:30
    Track 2 - Track 2
  • U
  • UDID pwnage (0day for iOS)

    Aldo Cortesi
    Wed, 16:30 - 17:30
    Track 1 - Track 1
  • Using the Teensy for so much more...

    Joshua Kelley, David Kennedy
    Wed, 12:30 - 13:30
    Track 1 - Track 1
  • V
  • Vulnerability Research Circa 1851

    Schuyler Towne
    Wed, 13:30 - 14:30
    Track 1 - Track 1
  • W
  • Walking the Green Mile: How to Get Fired After a Security Incident

    Brian Baskin
    Thu, 10:30 - 11:30
    Track 1 - Track 1
  • Weaponizing The Smartphone: Deploying The Perfect WMD

    Nicholas Donarski
    Wed, 11:30 - 12:30
    Track 3 - Track 3
  • Wireless’ dirty sisters: The other RF you aren’t looking at and why you are going to get hurt!

    warezjoe
    Thu, 12:30 - 13:30
    Track 2 - Track 2