International Ballroom, Center (big room)
Opening Remarks, Rumblings, Ruminations, and Rants
Incident Response and the Attorney Client Privilege
Ad-Laundering: Bribes & Backdoors
Machine Learning Models that Predict Mental Health Status on Twitter and Their Privacy Implications
How the Press Gets Pwned
Kinder Garten Security: Teaching the Pre-college Crowd
It’s 2019 and Special Agent Johnny Still Can’t Encrypt
Firetalks Opening
Shut up and Listen
Specialists versus Jack-Of-All-Trades
Équipe Rouge: The Ethics of Prosecuting An Offensive Security Campaign
Weapons of Text Destruction
Infosec and 9-1-1: When the Location of Your Emergency is in the Building
Whats the latest 411 on 419s?
Firetalks Closing
The Beginner’s Guide to the Musical Scales of Cyberwar
The APT at Home: The attacker that knows your mother’s maiden name
Firemen vs. Safety Matches: How the current skills pipeline is wrong
Ground Truth: 18 vendors, 6000 firmware images, 2.7 million binaries, and a flaw in the Linux/MIPS stack
Advancing a Scientific Approach to Security Tool Evaluations with MITRE ATT&CK™
Mentoring the Intelligent Deviant: What the special operations and infosec communities can learn from each other
A Little Birdy Told Me About Your Warrants
A Tisket, a Tasket, a Dark Web Shopping Basket
Behind Enemy Lines: Inside the operations of a nation state’s cyber program
Deconstructing DeFeNeStRaTe.C
Reversing SR-IOV For Fun and Profit
Encrypting the Web Isn’t Enough: How EFF Plans to Encrypt the Entire Internet
Closing Plenary: Between Two Moose
Closing Remarks