+10 Knowledge: Sharing What You Learn For the Benefit of the Everyman.
Actionable Threat Intelligence: ISIS, SuperBall, SuperFish, and your less magical 8-ball
Adding +10 Security to Your Scrum Agile Environment
Advancing Internet Security Research with Big Data and Graph Databases
A hackers guide to using the YubiKey - how to add inexpensive 2-factor authentication to your next project.
AI and CND - implications for security in the era of Artificial Intelligence
All You Need Is One: A ClickOnce Love Story
All Your RFz Are Belong to Me - Software Defined Radio Exploits
Analogue Network Security
Android App Security Auditing
Angler Lurking in the Domain Shadows
An introduction of the Kobra, a client for the Badger version 2.0, providing tactical situational awareness, physical tampering protection, and automatic process mitigation
Are You Sure That You Still Need Passwords?
A Security/Usability Review of Wordpress 2FA Plugins
Ask the EFF
Auth for Encrypted Services with Server Side APT
Backdooring MS Office documents with secret master keys
Barely Legal: the Hacker’s Guide to Cybersecurity Legislation
Being the Paid Expert in the Room: Consulting for a Company or On Your Own
Better Spectrum Monitoring with Software Defined Radio
Bio-Hacking: Implantable chip attack vector
Blind Hashing
Breachego
Building an Empire with PowerShell
Catching Linux Post-Exploitation with Auditd
Cats and Mice - Ever evolving attackers and other game changerse
Check That Certificate
Classic Misdirection: Social Engineering to Counter Surveillance
Closing remarks and thanks from our Emcee
Common Mistakes that Engineers make while Interviewing in a “Hot” market
Crash The IoT Train Yourself: Intentionally Vulnerable WRT (IV-WRT)
Crema: A LangSec-inspired Language
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools
Did you make a difference today?
Don’t hate the Disclosure, Hate the Vulnerability: How the government is bringing researchers and vendors together to talk vulnerability disclosure.
Dropping hell0days: Business Interaction for Security Professionals - Or Anyone Else
Embedding Web Apps in MITMProxy Scripts
Exploit Kit Shenanigans: They’re Cheeky!
FAA, FTC, FCC - FU: How Three F'ing Agencies are Shaping Info Sec
Fight back – raising awareness @infosec
Fishing To Phishing - It’s all about slimy creatures.
For love of country: 15 years of Security Clearance Decisions
Getting the data out using social media
Hacking Our Way Into Hacking
Hack the Future
Haking the Next Generation
Harvesting Passwords from Source Code, Scripts, and Code Repositories
Have I seen you before?
How can we ensure safer Automobiles?
How can we ensure safer Medical Devices?
How I learnt hacking in highschool
How Portal Can Change Your Security Forever
How Secure Are Multi-Word Random Passphrases?
How to WCTF
I Amateur Radio (And So Can You!)
I Am The Cavalry Track Introduction and Overview
I Forgot My Password
Infosec careers, myth vs. reality
Injection on Steroids: Code-less Code Injections and 0-Day Techniques
Insider Tricks for Bug Bounty Success
Interview Role Play
Introduction to the Career Track
Intro to Data Science for Security
It’s All Geek to Me
It’s Not Just Your Answer: Hacking Tech Interviews
Leading in a "Do"-ocracy
Life at a Startup, Tales From the Trenches: The Good, the Bad and the Ugly
Longevity in InfoSec – Turning Passion into Expertise & Respect
Making & Breaking Machine Learning Anomaly Detectors in Real Life
Maximizing Bro Detection
No More Fudge Factors and Made-up Shit: Performance Numbers That Mean Something
No More Graphical Passwords
NSA Playset: Bridging the Airgap without Radios
Open Up A Can of OSINT On 'Em
Out of Denial: A 12-Step Program for Recovering Admins
Password Alert by Google
PBKDF2: Performance Matters
Pentesting PLCs 101
Pentesting with Docker
Phishing: Going from Recon to Credentials
Poppin' (Digital) Locks
Practical Application Whitelisting Evasion
Practice Safe Cyber: The Miseducation of American Students on Internet Safety
Privileges in the Real World: Securing Password Management
Pushing on String: Adventures in the 'Don't Care' Regions of Password Strength
Radare2 an open source reverse engineering framework
#radBIOS: Wireless networking with audio
Remote Access, the APT
Rethink, Repurpose, Reuse... Rain Hell
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
Securing the Everything Store: Challenges, Opportunities and Rewards
Security Engineering At Amazon
Security Questions Considered Harmful
Serial Box - Primer for dealing with Serial and JTAG for basic hardware hacking
SIEMple technology
Social Media in Incident Response Program
Software-Defined Radio Signal Processing with a $5 Microcontroller.
Some things you just can’t find on Google.
Speaking Metrics to Executives
State of Automotive Cyber Safety
State of Medical Device Cyber Safety
Stress, Burnout, Rinse, Repeat
Stronger Password-Based Encryption Using I/O Hardness
Sue the Fed, Hack your FBI File
TAPIOCA (TAPIOCA Automated Processing for IOC Analysis)
Tell Me Who You Are, and I Will Tell You Your Lock Pattern
The Internet of ... Mainframes?! WTF?
The Journey To ICS
The story of L0phtCrack
Towards Standardizing Comparisons of Password Guessability
Underground Wi-Fi Hacking for Web Pentesters
(Un)Keynote: INCITE CLUB: WendyLady vs. ErrataRob or, “Fly THIS Sideways!”
Verum - How Skynet Started as a Context Graph
Violent Python
Welcome back, Emcee sets tone for the afternoon
What Lurks in the Shadow
What's New Pussycat: Recent Improvements to Powercat
What the heck is this radio stuff, anyway?
What would fix passwords? Some weekly password audits. Pretty graphs to prove it! (A Haiku)
When steganography stops being cool
Who Watches the Watchers? Metrics for Security Strategy
Why does InfoSec play bass? And other observations about hacker culture.
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
Why We Can't Have Nice Things: Original Research on Conflict Resolution Styles in Information Security & Risk Management
Wi-Door - Bind/Rev Shells for your Wi-Fi
WiFi Pineapple: Winning the WiFi Battlefield
Yes, you too can perform daring acts of Live Acquisition.
You Hack, We Capture: Attack Analysis with Honeypots
Your Electronic Device, Please: Understanding the Border Search Exception & Electronic Devices
ZOMG It's OSINT Heaven!