• 1
  • 10 Words to Stop Using Now

    Deidre Diamond
    Thu, 09:00 - 09:45
    Ballroom - Keynotes and Con
  • 10 Words to Stop Using Now (Workshop)

    Deidre Diamond
    Thu, 10:00 - 11:30
    Shubert - Security & Business
  • A
  • Attendee Reception

     
    Wed, 17:30 - 18:30
    Vendor Room - Keynotes and Con
  • B
  • Bootstrapping A Security Research Project

    Andrew Hay
    Thu, 10:00 - 10:40
    Washington - Security & Metrics
  • D
  • Deconstructing The Cyber Kill Chain of Angler Campaign

    Artisom Holub
    Thu, 10:00 - 10:40
    Library - Security & Technology
  • Defending the Cloud from the Full Stack Hack

    Erik Peterson
    Wed, 10:45 - 11:25
    Library - Cloud & IoT
  • Developing a Threat Modeling Mindset

    Robert Hurlbut
    Wed, 14:20 - 15:00
    Washington - Application Security
  • DGA Antivenom: Stopping new configurations before analysis

    Chip McSweeney
    Wed, 13:30 - 14:10
    Library - Cloud & IoT
  • Don’t Touch Me That Way

    Jack Mannino
    Wed, 15:35 - 14:15
    Washington - Application Security
  • E
  • Emerald City of Cyber Security

    Ben Herzberg
    Thu, 10:50 - 11:30
    Library - Security & Technology
  • Evening Networking Reception

     
    Wed, 19:00 - 21:30
    Liquid Art House - Keynotes and Con
  • H
  • How security changes in the cloud and why you care

    Nathan Cooprider
    Wed, 11:35 - 12:15
    Library - Cloud & IoT
  • httpillage: calling all nodes

    John Poulin
    Thu, 11:40 - 12:20
    Library - Security & Technology
  • I
  • Improving your protection by automating real world attacks

    Antonio Costa, Alan Silva
    Wed, 10:45 - 11:25
    Washington - Application Security
  • Insider Threats: Evil Employees and the Nation-states and Competitors who Love Them

    Brian Contos
    Wed, 13:30 - 14:10
    Washington - Application Security
  • K
  • Key Attribute Risk Management and Analysis (KARMA)

    Daniel Miessler
    Thu, 14:10 - 14:50
    Washington - Security & Metrics
  • L
  • Learning from Crises: Roles, Risks, and Rewards on the Road to Recovery

    Debora Plunkett
    Thu, 15:10 - 15:55
    Ballroom - Keynotes and Con
  • Lightning Talks

     
    Thu, 16:45 - 17:30
    Ballroom - Career Development
  • M
  • Making Change from Assessments that is not just Monetary

    Matthew Morency
    Thu, 14:10 - 14:50
    Shubert - Security & Business
  • Mr. Human - Vulnerability Management from the Attacker’s Perspective

    Michael Roytman
    Thu, 11:40 - 12:20
    Washington - Security & Metrics
  • N
  • Nightmares of a Pentester

    Chris Nickerson
    Wed, 16:30 - 17:15
    Ballroom - Keynotes and Con
  • O
  • Opening Remarks

     
    Wed, 08:30 - 09:00
    Ballroom - Keynotes and Con
  • P
  • Personal Development Panel

     
    Thu, 16:00 - 16:45
    Ballroom - Career Development
  • Play Through the Pain? - The Impact of Forbidden Knowledge on Security and Intelligence Professionals

    Richard Thieme
    Wed, 09:00 - 09:45
    Ballroom - Keynotes and Con
  • R
  • Raffle Prizes and Closing Remarks

     
    Thu, 17:30 - 18:00
    Ballroom - Keynotes and Con
  • Role Playing with Intermediate Representations

    Jared Carlson, Andrew Reiter
    Wed, 11:35 - 12:15
    Washington - Application Security
  • S
  • Side Channel Defense with Intel Cache Allocation Technique

    Xiaoning Li, Pei Luo
    Thu, 14:10 - 14:50
    Library - Security & Technology
  • Social Media Risk Metrics

    Iftach Ian Amit
    Thu, 13:20 - 14:00
    Washington - Security & Metrics
  • Speed Networking

     
    Wed, 09:45 - 10:30
    Ballroom - Career Development
  • T
  • Talk Security to Me: Case Studies for Communicating Security Issues

    Sandy Carielli, Rick Cleary
    Thu, 13:20 - 14:00
    Shubert - Security & Business
  • The Art of Crisis Management

    Jen Ellis, Josh Feinblum
    Wed, 13:30 - 15:00
    Shubert - Business and Security
  • The Bad Guys Have Your Pacemaker: How to Stop Attacks on Your IoT Devices

    Chris Schmidt
    Wed, 14:20 - 15:00
    Library - Cloud & IoT
  • The Cybersecurity Education Gap - What Do We Do Now?

    Ming Chow, Roy Wattanasin
    Thu, 11:40 - 12:20
    Shubert - Security & Business
  • The Topology of Malicious Activity in IPv4

    Suchin Gururangan, Bob Rudis
    Thu, 10:50 - 11:30
    Washington - Security & Metrics
  • Toward Consistent, Usable Security Risk Assessment of Medical Devices

    Penny Chase, Steve Christey Coley
    Wed, 15:35 - 16:15
    Library - Cloud & IoT
  • U
  • Upstream without a paddle - lessons learnt!

    Matt Coles, Tania Ward
    Wed, 15:35 - 16:15
    Shubert - Business and Security
  • W
  • Why is Network Access Control So Hard? Is there a Better Way?

    Jason Garbis
    Thu, 13:20 - 14:00
    Library - Security & Technology
  • Workshop

    Rob Cheyne, Richard Thieme
    Wed, 10:45 - 12:15
    Shubert - Business and Security