2011: A Cloud Odyssey
Advanced data exfiltration - the way Q would have done it
Agnitio: the security code review Swiss army knife. Its static analysis, but not as we know it
All about the Benjamins -- Google's vulnerability reward programs
Anti Anti Forensics
Are There Still Wolves Among Us?
A study of what really breaks SSL
Better to burn out than to fade away?
Boyd's OODA and General Predator/Prey theory
Cognitive Intelligence and Network Analysis
Cultural Cues from High Risk Professions
Cyber Fast Track
Distributed Denial of Service Attacks for Whitehats
Exploiting Management For Fun and Profit - or - "Management is not stupid, you are"
Exploiting the Hard-Working DWARF
Fuck the Penetration Testing Execution Standard (PTES)
Hacking Google Chrome OS
Hacking webapps is more fun when the end result is a shell!
How Government Accountability Conflicts With Citizen Privacy (and Why It's Your Fault)
How (not) to run a Bsides
How to Hide Your Pr0n
How to pass audits with non-compliant systems
How to Win Followers and Influence Friends: Hacking Twitter to Boost Your Security Career
Info Sec Institute: What College Never Will Teach You
InfoSex Sells: The Impact Of The Media And Public Opinion On Security
Living the Dream! - Info Sec Style
Long Beard's Guide to Exploit Dev
Pentultimate Hack - Manipulating Layers 8 & 9 of the OSI Model (Management & Budget)
Planes keep falling on my head
Siemens / SCADA 0day
Smile for the Grenade! Camera go Bang!
Something Awesome™
Sounds Like Botnet
Tell Me Your Secrets - Tales of Social Engineering and The Human Mind
THE 99¢ HEART SURGEON DILEMMA (How to fix penetration testing.)
Transparent Botnet Command and Control for Smartphones over SMS
UDID pwnage (0day for iOS)
Using the Teensy for so much more...
Vulnerability Research Circa 1851
Walking the Green Mile: How to Get Fired After a Security Incident
Weaponizing The Smartphone: Deploying The Perfect WMD
Wireless’ dirty sisters: The other RF you aren’t looking at and why you are going to get hurt!