Opening Remarks, Rumblings, and Rants
Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares
The Evolution of Linux Kernel Module Signing
How Hackers for Charity (Possibly) Saved Me a Lot of Money
CCTV: Setup, Attack Vectors, and Laws
Security Analytics: Less Hype, More Data
Dissipation of Hackers in the Enterprise
Privacy Online: What Now?
Large Scale Network and Application Scanning
Closing Remarks