Welcome to DerbyCon 2011 – Intro to the con and events
Keynote - Acoustic Intrusions
Hackers for Charity Update
Adaptive Penetration Testing
The Penetration Testing Execution Standard (PTES) Panel
The Details Don’t Matter
Compliance: An Assault on Reason
Hook, Line and Syncer: The Liar for Hire’s Ultimate Tacklebox
Jason Scott’s Shareware Calvacade
Mining Sensitive Information From Images Using Command-Line OCR
Beat to 1337: Creating A Successful University Cyber Defense Organization
Tactical Post Exploitation
Offensive Countermeasures: Still trying to bring sexy back
When Fuzzers Miss: The no Hanging Fruit.
You’re Going to Need a Bigger Shovel – A Critical Look at Software Security Assurance
OSINT Beyond the Basics
Anti-Forensics for the Louise
Tomorrow you can patch that 0day – but your users will still get you p0wn3d
Covert Channels using IP Packet Headers
BioMining: Data Mining for (Neuro) hackers
Battery Firmware Hacking
Win32 Exploit Development With Mona and the Metasploit Framework
Collecting Underpants To Win Your Network
Social Engineering is a Fraud
Infectious Media – Bypassing AutoRun once and for all
Desktop Betrayal: Exploiting Clients through the Features They Demand
Closing Ceremony