Accessible Threat Intelligence with the Splunk app "Optiv Threat Intel"
Automating Malware Analysis for Proactive Detection
Botnet C&C: up close and personal
Bridging the Gap:Lessons in Adversarial Tradecraft
Closing Keynote: If I wake evil (How I would attack you if I turned into a criminal mastermind)
Closing Remarks
CTF/Red Team Challenge
Detecting Least Bit Stegonagraphy with Power Shell
Fast Furious and Secure: DevOps Edition
Inside real APT
Maintaining Focus inside the security Maturity Curve
Micro versus Macro
Opening Keynote Cryptography Law and general Q&A with the EFF
Opening Remarks
Opening Remarks (day 2)
Quick Fire Talks Open Mic
Quick Fire Talks Open Mic (day 2)
Setting up a test lab with VMWARE
The Enforcement Awakens
Training - Security 101 boot camp
Training - Security 101 boot camp (day 2)
Training - Spy Game: Red Teaming in the real world
Training - Spy Game: Red Teaming in the real world (day 2)
Universal Attack Surfaces
Workshop: How to get a job in Information Security