• Wednesday, May 18
  • Improving your protection by automating real world attacks

    Antonio Costa, Alan Silva
    Wed, 10:45 - 11:25
    Washington - Application Security
  • Role Playing with Intermediate Representations

    Jared Carlson, Andrew Reiter
    Wed, 11:35 - 12:15
    Washington - Application Security
  • Insider Threats: Evil Employees and the Nation-states and Competitors who Love Them

    Brian Contos
    Wed, 13:30 - 14:10
    Washington - Application Security
  • Developing a Threat Modeling Mindset

    Robert Hurlbut
    Wed, 14:20 - 15:00
    Washington - Application Security
  • Don’t Touch Me That Way

    Jack Mannino
    Wed, 15:35 - 14:15
    Washington - Application Security
  • Thursday, May 19
  • Bootstrapping A Security Research Project

    Andrew Hay
    Thu, 10:00 - 10:40
    Washington - Security & Metrics
  • The Topology of Malicious Activity in IPv4

    Suchin Gururangan, Bob Rudis
    Thu, 10:50 - 11:30
    Washington - Security & Metrics
  • Mr. Human - Vulnerability Management from the Attacker’s Perspective

    Michael Roytman
    Thu, 11:40 - 12:20
    Washington - Security & Metrics
  • Social Media Risk Metrics

    Iftach Ian Amit
    Thu, 13:20 - 14:00
    Washington - Security & Metrics
  • Key Attribute Risk Management and Analysis (KARMA)

    Daniel Miessler
    Thu, 14:10 - 14:50
    Washington - Security & Metrics