Advanced Persistent Threats (Shining the Light on the Industries' Best Kept Secret)
Being Inbred Isn't Just a Problem for Hillbillies. Groupthink and the InfoSec Industry
Computing Risk without Numbers: A Semantic Approach to Risk Metrics
Memory Corruption, Exploitation, and You
My Life on the Infosec D-List
Network Time Bandit
Playing with Fire – Live Demonstration of Today’s Most Dangerous Malware
Preparing for a PCI forensic investigation - A ex-QIRA speaks out
Risk Management - Time to blow it up and start over?
Security? Who cares!
Social Penetration
So What's the Alternative? A group discussion of the security solutions replacing password authentic
So You Want to Analyze Malware?
The Great Compliance Debate: No Child Left Behind or The Polio Vaccine
Unicorns, Clubhouses, and Ruffled Feathers: Women in Security
Your computer is worth 30 cents