• 2
  • 2015 State of Vulnerability Exploits

    Amol Sarwate
    Tue, 10:15 - 11:15
    Theatre (Hall G) - Sponsors
  • A
  • Advanced Threat Analytics: Adapt as Fast as Your Enemies

    Lanny Cofman, Jasbir Gill
    Tue, 11:30 - 12:00
    701A - Sponsors
  • Advanced Threats: Eliminating the Blind Spot

    Fahmy Kadiri
    Wed, 10:15 - 10:45
    Theatre (Hall G) - Sponsors
  • Agile Incident Management - Bringing the “Win” Back to Data and Privacy Breach Responses

    Robert Beggs
    Wed, 14:40 - 15:40
    803 - Security Fundamentals
  • Automation is your Friend: Embracing SkyNet to Scale Cloud Security

    Mike Rothman
    Tue, 14:40 - 15:40
    701A - Tech
  • B
  • Breaking Access Controls with BLEKey

    Mark Bassegio, Eric Evenchick
    Tue, 14:40 - 15:40
    801B - Tech
  • Breaking and Fixing Python Applications

    Enrico Branca
    Wed, 13:25 - 14:25
    801B - Tech
  • Browser and Environment Hardening

    Kurtis Armour
    Tue, 11:30 - 12:00
    801B - Sponsors
  • Building an Effective Vulnerability & Remediation Management Program

    Dave Millier
    Tue, 13:25 - 14:25
    803 - Security Fundamentals
  • Building Better Indicators: CrowdSourcing Malware IOCs

    Sean Wilson
    Tue, 15:55 - 16:55
    Theatre (Hall G) - Sponsors
  • Bulletproofing Your Incident Response Plan: Effective Tabletops

    Reg Harnish
    Wed, 13:25 - 14:25
    701B - Management
  • Business Backed CVEs - The Major Vulnerabilities of the Past Year

    Brad Antoniewicz, Atif Ghauri
    Wed, 14:40 - 15:40
    Theatre (Hall G) - Sponsors
  • C
  • Certifi-gate: Has your Android device been Pwned?

    Shai Yanovski
    Wed, 11:30 - 12:00
    803 - Sponsors
  • Changing the Game of Threat Hunting

    Jim Penrose
    Tue, 13:25 - 14:25
    Theatre (Hall G) - Sponsors
  • CISO Survival Guide: How to thrive in the C-Suite and Boardroom

    Chris Wysopal
    Tue, 13:25 - 14:25
    701B - Management
  • Closing Remarks

     
    Wed, 15:40 - 15:50
    Keynote Hall - Keynote
  • Complete Application Ownage via Multi-POST XSRF

    Adrien de Beaupré
    Tue, 13:25 - 14:25
    801B - Tech
  • Confessions of a Professional Cyber Stalker

    Ken Westin
    Tue, 13:25 - 14:25
    801A - Tech
  • Cymon - An Open Threat Intelligence System

    Roy Firestein
    Wed, 14:40 - 15:40
    701A - Tech
  • D
  • Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing

    Alex Pinto
    Tue, 10:15 - 11:15
    801A - Tech
  • Detecting the Bear in Camp: How to Find Your True Vulnerabilities

    Ryan Poppa
    Tue, 11:30 - 12:00
    803 - Sponsors
  • DevOps For The Home

    Kellman Meghu
    Wed, 10:15 - 11:15
    701A - Tech
  • Dolla Dolla Bill Y’all: Cybercrime Cashouts

    Benjamin Brown
    Wed, 10:15 - 11:15
    701B - Management
  • Drug Pump and Medical Device Security

    Jeremy Richards
    Tue, 15:55 - 16:55
    801B - Tech
  • E
  • Effective Ways to Tackle Vulnerability Remediation

    Dave Millier
    Wed, 11:30 - 12:00
    801B - Sponsors
  • Ensuring the Success of Your IAM Project

    Jeremy Hanlon
    Wed, 10:45 - 11:15
    Theatre (Hall G) - Sponsors
  • Exploitation Trends: From Potential Risk to Actual Risk

    Tim Rains
    Tue, 10:15 - 11:15
    701A - Tech
  • Exposing Advanced Threats: How big data analytics is changing the way advanced threat defense is deployed, managed and measured

    Sean Earhard
    Wed, 11:30 - 12:00
    Theatre (Hall G) - Sponsors
  • G
  • Globalization of Cybercrime

    Jason Brown
    Tue, 12:00 - 13:10
    Keynote Hall - Keynote
  • Ground Zero Financial Services: Targeted Attacks from the Darknet

    Joe Pizzo
    Wed, 10:15 - 11:15
    803 - Security Fundamentals
  • H
  • Hijacking Arbitrary .NET Application Control Flow

    Topher Timzen
    Wed, 10:15 - 11:15
    801B - Tech
  • I
  • Incoming Threats At the Speed of Retail

    Wendy Nather
    Tue, 10:15 - 11:15
    801B - Tech
  • Insider Threat – The Soft Underbelly of CyberSecurity

    Harold Byun
    Wed, 13:25 - 14:25
    Theatre (Hall G) - Sponsors
  • IT Security Operations: Successful Transformation

    Kristin Lovejoy
    Tue, 09:00 - 10:00
    Keynote Hall - Keynote
  • K
  • Knowing what happened is only half the battle.

    Grayson Lenik
    Wed, 11:30 - 12:00
    701A - Sponsors
  • L
  • Learning To Love Your Attackers

    Ryan Linn
    Wed, 14:40 - 15:40
    801B - Tech
  • M
  • Make Metrics Matter

    Jessica Ireland
    Tue, 14:40 - 15:40
    701B - Management
  • Making & Breaking Machine Learning Anomaly Detectors in Real Life

    Clarence Chio
    Tue, 15:55 - 16:55
    801A - Tech
  • Malware Activity in Mobile Networks – An Insider View

    Kevin McNamee
    Tue, 13:25 - 14:25
    701A - Tech
  • Maturing InfoSec: Lessons from Aviation on Information Sharing

    Trey Ford
    Wed, 12:00 - 13:10
    Keynote Hall - Keynote
  • Mitigating the Alert - Impact Prevention in a super active security battlefield

    Brian Read
    Tue, 11:30 - 12:00
    801A - Sponsors
  • O
  • One Ring to Rule Them All - Hardware isolation and the future of virtualization security

    Simon Crosby
    Tue, 14:40 - 15:40
    Theatre (Hall G) - Sponsors
  • Opening Remarks

    Brian Bourne
    Tue, 08:50 - 09:00
    Keynote Hall - Keynote
  • Opening Remarks, day 2

    Brian Bourne
    Wed, 08:50 - 09:00
    Keynote Hall - Keynote
  • P
  • Peeling The Layers Of Vawtrak

    Raul Alvarez
    Tue, 10:15 - 11:15
    803 - Security Fundamentals
  • Preventing Home Automation Security Disasters

    James Arlen
    Wed, 13:25 - 14:25
    803 - Security Fundamentals
  • R
  • Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things

    Chayim Kirshen
    Tue, 15:55 - 16:55
    803 - Security Fundamentals
  • S
  • Security for non-Unicorns

    Ben Hughes
    Tue, 14:40 - 15:40
    803 - Security Fundamentals
  • Security is Essential to Privacy - But is not enough ... Enter Privacy by Design

    Dr. Ann Cavoukian
    Wed, 09:00 - 10:00
    Keynote Hall - Keynote
  • SIEM and the Art of Log Management

    Ron Pettit, Jeff Pold
    Wed, 11:30 - 12:00
    801A - Sponsors
  • Software Defined Networking / Attacker Defined Networking

    Rob VandenBrink
    Wed, 13:25 - 14:25
    801A - Tech
  • Stealth Attack From The Produce Aisle

    Keith Benedict, Todd Dow
    Tue, 15:55 - 16:55
    701A - Tech
  • Stealthier Attacks and Smarter Defending with TLS Fingerprinting

    Lee Brotherston
    Wed, 10:15 - 11:15
    801A - Tech
  • T
  • Taking back Endpoint Control!

    John Beal
    Tue, 11:30 - 12:00
    701B - Sponsors
  • The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight!

    Bob DuCharme
    Wed, 14:40 - 15:40
    701B - Management
  • The Internet of Bad Things and Securing the Software Defined Data Center

    Marc Edun, Ian Redden
    Wed, 11:30 - 12:00
    701B
  • There’s no such thing as a coincidence - Discovering Novel Cyber Threats

    Jim Penrose
    Tue, 10:15 - 11:15
    701B - Management
  • The State of Software Security

    Chris Wysopal
    Tue, 11:30 - 12:00
    Theatre (Hall G) - Sponsors
  • U
  • UNMASKING MALWARE

    Christopher Elisan
    Tue, 14:40 - 15:40
    801A - Tech
  • W
  • What does it take to deliver the most technologically advanced Games ever?

    Enzo Sacco, Quang Tu
    Tue, 15:55 - 16:55
    701B - Management
  • What Google knows about you and your devices, and how to get it

    Vladimir Katalov
    Wed, 13:25 - 14:25
    701A - Tech
  • X
  • Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities

    James Arlen, Brendan O’Connor
    Wed, 14:40 - 15:40
    801A - Tech