• A
  • Analyst, Know Thyself'

    Megan Carney
    Sat, 13:00 - 13:45
    Main Room
  • B
  • Bootstrapping A Security Research Project

    Andrew Hay
    Sat, 10:15 - 11:00
    Main Room
  • C
  • Closing Keynote

     
    Sun, 17:00 - 17:45
    Main Room
  • E
  • Evening social event

     
    Sat, 21:00 - 23:59
    Main Room
  • Exploiting and Preventing Blind SQL Injection in Hibernate

    Casey Dunham
    Sun, 15:00 - 15:45
    Main Room
  • H
  • How to deal with auditors

    Becky Mayse
    Sun, 13:00 - 13:45
    Main Room
  • How to get a job in information security workshop

    Josh More
    Sun, 10:00 - 14:00
    Workshop
  • I
  • Information Security from a Criminal Perspective

    Edward McCabe
    Sun, 16:00 - 16:45
    Main Room
  • K
  • Keynote

    Richard Thieme
    Sat, 09:00 - 10:00
    Main Room
  • M
  • MacGyver Live IR w/ duct tape, bailing wire, and IRFartpull

    Matt Nelson
    Sat, 15:00 - 15:45
    Main Room
  • Maximizing Windows Security

    J.melstrom
    Sun, 09:00 - 09:45
    Main Room
  • Modern Password Cracking

    Joshua Platz
    Sat, 16:00 - 16:45
    Main Room
  • P
  • Prepping for the OSCP - Kali/ARM/NIST/FIPS/AES/Python

    Chuck Craft
    Sun, 14:00 - 14:45
    Main Room
  • Putting the Intelligence back in Threat Intel

    Edward McCabe
    Sat, 14:00 - 14:45
    Main Room
  • R
  • Reverse Engineering with open-source tools workshop

    Spenser Reinhardt
    Sat, 10:00 - 14:00
    Workshop
  • S
  • Software Defined Radio (SDR) 101

    Mike Saunders
    Sat, 11:15 - 12:00
    Main Room
  • T
  • Trends between domain pricing & spam/malicious activity

    Tazz Tazz
    Sun, 10:00 - 11:00
    Main Room
  • W
  • What time is it? Securing NTP

    Shaun Kelly
    Sun, 11:15 - 12:00
    Main Room