• Wednesday, July 25
  • MY ARDUINO CAN BEAT UP YOUR HOTEL ROOM LOCK

    Cody Brocious
    Wed, 00:00 - 00:00
    Augustus III+IV - Defining the Scope
  • BLACK OPS

    Dan Kaminsky
    Wed, 11:45 - 12:45
    Augustus III+IV - Defining the Scope
  • CUTECATS.EXE AND THE ARAB SPRING

    Morgan Marqis-Boire
    Wed, 14:15 - 14:35
    Augustus III+IV - Defining the Scope
  • THE LAST GASP OF THE INDUSTRIAL AIR-GAP...

    Éireann Leverett
    Wed, 14:35 - 14:55
    Augustus III+IV - Defining the Scope
  • STIX: THE STRUCTURED THREAT INFORMATION EXPRESSION

    Sean Barnum
    Wed, 14:55 - 15:15
    Augustus III+IV - Defining the Scope
  • ERRATA HITS PUBERTY: 13 YEARS OF CHAGRIN

    Jericho
    Wed, 15:30 - 16:30
    Augustus III+IV - Defining the Scope
  • THE MYTH OF TWELVE MORE BYTES: SECURITY ON THE POST-SCARCITY INTERNET

    Tom Ritter, Alex Stamos
    Wed, 17:00 - 18:00
    Augustus III+IV - Defining the Scope
  • Thursday, July 26
  • TRUST, SECURITY, AND SOCIETY

    Bruce Schneier
    Thu, 10:15 - 11:15
    Augustus III+IV - Defining the Scope
  • THE CHRISTOPHER COLUMBUS RULE AND DHS

    Mark Weatherford
    Thu, 11:45 - 12:45
    Augustus III+IV - Defining the Scope
  • LEGAL ASPECTS OF CYBERSPACE OPERATIONS

    Robert Clark
    Thu, 14:15 - 15:15
    Augustus III+IV - Defining the Scope
  • TARGETED INTRUSION REMEDIATION: LESSONS FROM THE FRONT LINES

    Jim Aldridge
    Thu, 15:30 - 16:30
    Augustus III+IV - Defining the Scope
  • HACKING THE CORPORATE MIND: USING SOCIAL ENGINEERING TACTICS TO IMPROVE ORGANIZATIONAL SECURITY ACCEPTANCE

    James Philput
    Thu, 17:00 - 18:00
    Augustus III+IV - Defining the Scope