Attacker Ghost Stories: Mostly Free Defenses That Gives Attackers Nightmares
Bad Advice, Unintended Consequences, and Broken Paradigms – Think & Act Different!
Badge Intro
Closing
Closing Reception
CTF Intro
CVSS v3 – This One Goes to 11
Cyber Insurance – Worth the Effort or Total Ripoff?
Five Secrets to Building an Amazing Security Culture in Your Organization
How to Achieve Success with Cyber Risk Assessment and Analysis
How To Find Mobile Internet Love
How to Make a Lock
I Found a Thing and You Can Too: ISP’s Unauthenticated SOAP Service = Find (almost) All the Things!
Introducing Intelligence into Malware Analysis
Leading Security When the Rest of The Business Doesn’t Care About Security
Man In The Front – Modifying the Android OS for Mobile Application Testing
Offensive Mobile Forensics
Pissing Down The Leg Of Much Of Our Careers; Why Are You People Still Buying Firewalls & IPS?
Real World Intrusion Response – Lessons from the Trenches
RVAsec 2014 Keynote - Friday
RVAsec 2014 Keynote - Thursday
Terminal Cornucopia: Demystifying the Mullet
The hacker in the fun house mirror (A talk on skewed perspectives)
The Pyramid of Pain: Intel-Driven Detection & Response to Increase Your Adversary’s Cost of Operations
Third Party Risk Management and Cybersecurity
Welcome
Welcome - Friday