Attacking Modern SaaS Companies
Breaking is Bad: Why Everyone at This Conference Will be Unemployed
Closing Ceremony
Common Developer Crypto Mistakes (with illustrations in Java)
Data Breach Response: Why Communication Fails
Decoder Improved: An Improved Burp Suite Decoder
Defeating Application Defenses Through XSS
DNS Unbound
Get Low (To all STC STC STC STC)
Here We Go Again - A PenTester’s Year in Review
How Bad Is My DIY Password Manager?
How I Broke Into Your Datacenter
Insecure Design Patterns in IoT
Insecure Obsolete and Trivial: The Real IOT
It’s Time to Innovate for Cyber Defense (How to Out-Hack the Cyber Cracker)
Keynote
Lightning Talks
Problems With Elliptic Curves In TLS and SSH
Real Security Incidents, Unusual Situations
Responding to Cyber Attack at Machine Speed
Reverse Engineering Techniques for Game Hacking
Robust Defense For The Rest of Us
Systematic Network Security Troubleshooting (pcaps or gtfo)
The Guild: The Rise and Fall Future of Syracuse’s Hackerspace
The Hardest CTF I’ve Ever Done: My Experiences Reverse Engineering an MMORPG
Whose Idea Was That? Comparing Security Curriculums and Accreditations To Industry Needs