My Life on the Infosec D-List
Preparing for a PCI forensic investigation - A ex-QIRA speaks out
So What's the Alternative? A group discussion of the security solutions replacing password authentic
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept Secret)
How to Design and Develop Your Own Security Event
LUNCH & LightningTalks
Being Inbred Isn't Just a Problem for Hillbillies. Groupthink and the InfoSec Industry
Unicorns, Clubhouses, and Ruffled Feathers: Women in Security
Playing with Fire – Live Demonstration of Today’s Most Dangerous Malware
Network Time Bandit
Security? Who cares!
So You Want to Analyze Malware?
Computing Risk without Numbers: A Semantic Approach to Risk Metrics
Your computer is worth 30 cents
LUNCH & LightningTalks
Advanced Attack Detection using OpenSource tools
Securing Application Development
Social Penetration
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine
Risk Management - Time to blow it up and start over?
Memory Corruption, Exploitation, and You