• Tuesday, October 18
  • Securing Network Communications: An Investigation into Certificate Authorities on Mobile

    Andrew Blaich
    Tue, 10:15 - 11:15
    701A - Tech
  • Eliminating the Automation and Integration Risks of the “Security Frankenstein”

    Christopher E. Pogue
    Tue, 11:30 - 12:00
    701A - Sponsor Track
  • WiFi Exploitation: How passive interception leads to active exploitation

    Solomon Sonya
    Tue, 13:25 - 14:25
    701A - Tech
  • [Ab]using TLS for defensive wins

    Lee Brotherston
    Tue, 14:40 - 15:40
    701A - Tech
  • Crash Course in Kubernetes & Security

    Matt Johansen
    Tue, 15:55 - 16:55
    701A - Tech
  • Wednesday, October 19
  • How To Secure Serverless Applications

    Mark Nunnikhoven
    Wed, 10:15 - 11:15
    701A - Tech
  • Why Technology is Not the Answer to Cybersecurity

    Sean Blenkhorn
    Wed, 11:30 - 12:00
    701A - Sponsor Track
  • AirBnBeware: short-term rentals, long-term pwnage

    Jeremy Galloway
    Wed, 13:25 - 14:25
    701A - Tech
  • Lessons Learned Hunting IoT Malware

    Oliver Bilodeau
    Wed, 14:40 - 15:40
    701A - Tech