0wn The Con
Apple iOS Certificate Tomfoolery
Armor For Your Android Apps
Attacking Scada Wireless Systems For Fun And Profit - And Fixing
Becoming a Time Lord – Implications of Attacking Time Sources
Beyond Nymwars: An Analysis Of The Online Identity Battleground
Bright Shiny Things = Why We Need Intelligent Data Access Controls
Bringing The Sexy Back To...Defense In Depth
C10M – Defending the Internet At Scale
Chopshop: Busting The Gh0St
Closing Remarks
Crypto: You're Doing It Wrong
DIY: Using Trust To Secure Embedded Projects
Drones: Augmenting your cyber attack tool bag with aerial weapon systems
Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling
Forensics - ExFat Bastardized for Cameras
From "Shotgun Parsers" to Better Software Stacks
Generalized Single Packet Authorization For Cloud Computing Environments
Hackers get Schooled: Learning Lessons from Academia
Hacking As An Act Of War
Hide And Seek, Post-Exploitation Style
How Smart Is Bluetooth Smart?
How to Own A Building: Exploiting the Physical World With BacNET and the BacNET Attack Framework
Identity-Based Internet Protocol Network
If You Can Open The Terminal, You Can Capture The Flag: CTF for Everyone
Is Practical Information Sharing Possible?
Ka-Ching! How To Make Real Money
Mainframed: The Secrets Inside That Black Box
Malware Analysis: Collaboration, Automation & Training
Managed Service Providers: Pwn One and Done
Mastiff: Automated Static Analysis Framework
Moloch: A New And Free Way To Index Your Packet Capture Repository
No Tools? No Problem! Building a PowerShell Botnet
NSM And More With Bro Network Monitor
Opening Remarks and Rants
Openstack Security Brief
Page Fault Liberation Army Or Better Security Through Trapping
Paparazzi Over IP
Protecting Big Data From Cyber APT in the Cloud
Protecting Sensitive Information on iOS Devices
PunkSPIDER: An Open Source, Scalable Distributed Fuzzing Project Targeting The Entire Internet
Running a CTF: Panel and Discussion on the Art of Hacker Gaming
ShellSquid: Distributed Shells With Node
Swinging Security Style: An Immodest Proposal
Ten Strategies of a World-Class Computer Security Incident Response Team
The Cloud - Storms On The Horizon
The Computer Fraud and Abuse Act: Swartz, Auernheimer, and Beyond
These Go to Eleven: When the Law Goes Too Far
Thin Slicing a Black Swan: A Search for the Unknowns
When Did the Smartphone Pentest Framework Get Awesome?
Wipe The Drive!!! - Techniques For Malware Persistence
Writing a Thumbdrive for Active Disk Antiforensics