Welcome
Keynote
WCTF Magic as told by a clumsy Magician
Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk
Applying data science to identify malicious actors in enterprise logs
Attacking Patient Health: The Anatomy of Hospital Exploitation
Adversarial Post-Exploitation: Lessons From The Pros
Act and Think like an Epidemiologist to Combat Digital Diseases
We Should Talk About This: Data Security as an Issue for Communication Research
A Hacker's Guide to Usability Testing
Tales from the Crypt...(analyst)
"Knowing the Enemy"- Creating a Cyber Threat Actor Attribution Program
A Notional Framework for applying Antifragile thinking to the RMF -- Growing stronger through compromise
What's the Big Deal with Assessing ICS/SCADA?
Closing Remarks