Being the change, how to create secure end users
Sharing: What the world knows about your network
Security Shark Tank
Password Cracking 101: An Introduction to Getting The Keys to the Network
Cyber Security and other Emergent Features of Self-Organizing Systems
Compromising the Perimeter
Making the case for encrypted identity data
TBD Firetalk
SDR ALL THE THINGS