The Trials & Tribulations of an Infosec Pro in the Government Sector
Automated DNS Data Exfiltration and Mitigation
DNS Greylisting for Phun and Phishing Prevention
Accessibility: A Creative Solution to Living Without Sight
A Guide to Outsmarting the Machines
Financial Crime: Past, Present, and Future
Breaking Payment Points of Interaction
Why Snowden's Leaks Were Inevitable
Lie to Me - LIE TO THEM - Chronicles of "How to save $ at the Strip Club"
Slack as Intelligence Collector or "how anime cons get weird"
Saflok or Unsaflok, That is the Question
To Beat the Toaster, We Must Become the Toaster: How to Show A.I. Who's Boss in the Robot Apocalypse
God is a Human II - Artificial Intelligence and the Nature of Reality
Art of Espionage (v.303)
Panel - Oldtimers vs Noobz
Practical Penetration Testing of Embedded Devices
Tales from the Dongosphere: Lessons Learned Hosting Public Email for 4chan
Oops! I made a machine gun: The Progressive Lowering of the Barrier to Entry in Firearms Manufacturing
The next John Moses Browning will use GitHub
Taking Down Skynet (By Subverting the Command and Control Channel)
What's Lurking Inside MP3 Files That Can Hurt You?
The Other Way to Get a Hairy Hand; or, Contracts for Hackers
Front Door Nightmare
Active Incident Response
Homologation - Friend or Frenemy?
Ads and Messengers: Exploit Me How You Can