• Fix Me

  • Friday, September 26
  • Threat Modeling for Realz

    Bruce Potter
    Fri, 12:00 - 12:50
    Track 2
  • A Guided Tour of the Internet Ghetto :: Introduction to Tor Hidden Services

    Brent Huston
    Fri, 13:00 - 13:50
    Track 2
  • Red Teaming: Back and Forth, 5ever

    Josh Schwartz
    Fri, 14:00 - 14:50
    Track 2
  • How not to suck at pen testing

    John Strand
    Fri, 15:00 - 15:50
    Track 2
  • Mainframes, Mopeds and Mischief: A PenTester's Year in Review

    Tyler Wrightson
    Fri, 16:00 - 16:50
    Track 2
  • The Multibillion Dollar Industry That’s Ignored

    Jason Montgomery, Ryan Sevey
    Fri, 17:00 - 17:50
    Track 2
  • Code Insecurity or Code in Security

    Mano Paul
    Fri, 18:00 - 18:50
    Track 2
  • C3CM: Defeating the Command- Control- and Communications of Digital Assailants

    Russ McRee
    Fri, 19:00 - 19:50
    Track 2
  • Saturday, September 27
  • Attack Paths

    Eve Adams, Johnny Xmas
    Sat, 09:00 - 09:50
    Track 2
  • How to Secure and Sys Admin Windows like a Boss.

    Jim Kennedy
    Sat, 10:00 - 10:50
    Track 2
  • Red white and blue. Making sense of Red Teaming for good.

    Iftach Ian Amit
    Sat, 12:00 - 12:50
    Track 2
  • Around the world in 80 cons

    Jayson E. Street
    Sat, 13:00 - 13:50
    Track 2
  • Mirage — Next Gen Honeyports

    Adam Crompton, Mick Douglas
    Sat, 14:00 - 14:50
    Track 2
  • They touched you WHERE? When trusting a security questionnaire isn’t enough!

    Zack Fasel, Erin Jacobs
    Sat, 15:00 - 15:50
    Track 2
  • Active Directory: Real Defense for Domain Admins

    Jason Lang
    Sat, 16:00 - 16:50
    Track 2
  • The Wireless World of the Internet of Things

    JP Dunning
    Sat, 17:00 - 17:50
    Track 2
  • Sunday, September 28
  • Open Source Threat Intelligence: Developing a Threat intelligence program using open source tools and public sources

    Edward McCabe
    Sun, 09:00 - 09:50
    Track 2
  • Once upon a time… (InfoSec History 101)

    Jack Daniel
    Sun, 10:00 - 10:50
    Track 2
  • Hacking Mainframes; Vulnerabilities in applications exposed over TN3270

    Dominic White
    Sun, 12:00 - 12:50
    Track 2
  • Single Chip Microcontrollers: Beyond Arduino

    Tharon Hall
    Sun, 13:00 - 13:50
    Track 2
  • Building Better Botnets with IPv6

    Code24
    Sun, 14:00 - 14:50
    Track 2
  • Bad Advice- Unintended Consequences- and Broken Paradigms

    Steve Werby
    Sun, 15:00 - 15:50
    Track 2
  • Simple Network Management Pwnd

    Deral Heiland, Matt Kienow
    Sun, 16:00 - 16:50
    Track 2