• Saturday, January 18
  • Introducing DARPA's Cyber Grand Challenge

    Mike Walker
    Sat, 10:00 - 10:50
    Belay It room - Belay it
  • Unambiguous Encapsulation - Separating Data and Signaling

    Michael Ossmann, Dominic Spill
    Sat, 11:00 - 11:50
    Belay It room - Belay it
  • A Critical Review of Spatial Analysis

    David Giametta, Andrew Potter
    Sat, 12:00 - 12:50
    Belay It room - Belay it
  • Data Whales and Troll Tears: Beat the Odds in InfoSec

    Allison Miller, Davi Ottenheimer
    Sat, 14:00 - 14:50
    Belay It room - Belay it
  • Operationalizing Threat Information Sharing: Beyond Policies and Platitudes

    Sean Barnum, Aharon Chernin
    Sat, 15:00 - 15:50
    Belay It room - Belay it
  • The "Science of Cyber" and the Next Generation of Security Tools

    Paulo Shakarian
    Sat, 16:00 - 16:50
    Belay It room - Belay it
  • Timing-Based Attestation: Sexy Defense, or the Sexiest?

    John Butterworth, Corey Kallenberg, Xeno Kovah
    Sat, 17:00 - 17:50
    Belay It room - Belay it
  • Sunday, January 19
  • "How I Met Your Mother" or The Brief and Secret History of Bletchley Park and How They Invented Cryptography and the Computer Age

    Benjamin Gatti
    Sun, 10:00 - 10:50
    Belay It room - Belay it
  • Raising Costs for Your Attackers Instead of Your CFO

    Aaron Beuhring, Kyle Salous
    Sun, 11:00 - 11:50
    Belay It room - Belay it
  • Practical Applications of Data Science in Detection

    Mike Sconzo, Brian Wylie
    Sun, 12:00 - 12:50
    Belay It room - Belay it