• 08:50
  • Opening Remarks

    Brian Bourne
    Tue, 08:50 - 09:00
    Keynote Hall - Keynote
  • 09:00
  • IT Security Operations: Successful Transformation

    Kristin Lovejoy
    Tue, 09:00 - 10:00
    Keynote Hall - Keynote
  • 10:15
  • Exploitation Trends: From Potential Risk to Actual Risk

    Tim Rains
    Tue, 10:15 - 11:15
    701A - Tech
  • Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing

    Alex Pinto
    Tue, 10:15 - 11:15
    801A - Tech
  • Incoming Threats At the Speed of Retail

    Wendy Nather
    Tue, 10:15 - 11:15
    801B - Tech
  • There’s no such thing as a coincidence - Discovering Novel Cyber Threats

    Jim Penrose
    Tue, 10:15 - 11:15
    701B - Management
  • Peeling The Layers Of Vawtrak

    Raul Alvarez
    Tue, 10:15 - 11:15
    803 - Security Fundamentals
  • 2015 State of Vulnerability Exploits

    Amol Sarwate
    Tue, 10:15 - 11:15
    Theatre (Hall G) - Sponsors
  • 11:30
  • Advanced Threat Analytics: Adapt as Fast as Your Enemies

    Lanny Cofman, Jasbir Gill
    Tue, 11:30 - 12:00
    701A - Sponsors
  • Mitigating the Alert - Impact Prevention in a super active security battlefield

    Brian Read
    Tue, 11:30 - 12:00
    801A - Sponsors
  • Browser and Environment Hardening

    Kurtis Armour
    Tue, 11:30 - 12:00
    801B - Sponsors
  • Taking back Endpoint Control!

    John Beal
    Tue, 11:30 - 12:00
    701B - Sponsors
  • Detecting the Bear in Camp: How to Find Your True Vulnerabilities

    Ryan Poppa
    Tue, 11:30 - 12:00
    803 - Sponsors
  • The State of Software Security

    Chris Wysopal
    Tue, 11:30 - 12:00
    Theatre (Hall G) - Sponsors
  • 12:00
  • Globalization of Cybercrime

    Jason Brown
    Tue, 12:00 - 13:10
    Keynote Hall - Keynote
  • 13:25
  • Malware Activity in Mobile Networks – An Insider View

    Kevin McNamee
    Tue, 13:25 - 14:25
    701A - Tech
  • Confessions of a Professional Cyber Stalker

    Ken Westin
    Tue, 13:25 - 14:25
    801A - Tech
  • Complete Application Ownage via Multi-POST XSRF

    Adrien de Beaupré
    Tue, 13:25 - 14:25
    801B - Tech
  • CISO Survival Guide: How to thrive in the C-Suite and Boardroom

    Chris Wysopal
    Tue, 13:25 - 14:25
    701B - Management
  • Building an Effective Vulnerability & Remediation Management Program

    Dave Millier
    Tue, 13:25 - 14:25
    803 - Security Fundamentals
  • Changing the Game of Threat Hunting

    Jim Penrose
    Tue, 13:25 - 14:25
    Theatre (Hall G) - Sponsors
  • 14:40
  • Automation is your Friend: Embracing SkyNet to Scale Cloud Security

    Mike Rothman
    Tue, 14:40 - 15:40
    701A - Tech
  • UNMASKING MALWARE

    Christopher Elisan
    Tue, 14:40 - 15:40
    801A - Tech
  • Breaking Access Controls with BLEKey

    Mark Bassegio, Eric Evenchick
    Tue, 14:40 - 15:40
    801B - Tech
  • Make Metrics Matter

    Jessica Ireland
    Tue, 14:40 - 15:40
    701B - Management
  • Security for non-Unicorns

    Ben Hughes
    Tue, 14:40 - 15:40
    803 - Security Fundamentals
  • One Ring to Rule Them All - Hardware isolation and the future of virtualization security

    Simon Crosby
    Tue, 14:40 - 15:40
    Theatre (Hall G) - Sponsors
  • 15:55
  • Stealth Attack From The Produce Aisle

    Keith Benedict, Todd Dow
    Tue, 15:55 - 16:55
    701A - Tech
  • Making & Breaking Machine Learning Anomaly Detectors in Real Life

    Clarence Chio
    Tue, 15:55 - 16:55
    801A - Tech
  • Drug Pump and Medical Device Security

    Jeremy Richards
    Tue, 15:55 - 16:55
    801B - Tech
  • What does it take to deliver the most technologically advanced Games ever?

    Enzo Sacco, Quang Tu
    Tue, 15:55 - 16:55
    701B - Management
  • Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things

    Chayim Kirshen
    Tue, 15:55 - 16:55
    803 - Security Fundamentals
  • Building Better Indicators: CrowdSourcing Malware IOCs

    Sean Wilson
    Tue, 15:55 - 16:55
    Theatre (Hall G) - Sponsors
  • 17:30
  • Reception

     
    Tue, 17:30 - 19:30
    Steam Whistle Brewery