Hacking the STORM
Using Wireshark for Incident Response and Threat Hunting
Tournament: The Ultimate Secure Coding Throw Down
Linux Hardening - The Easy Way
Introduction to Cryptographic Attacks
Free and Fair Elections in an Internet Era
Loki: Add a little chaos to your USB drive
The Road to Hell is Paved with Bad Passwords
Breaking Smart [Bank] Statement
Security data science -- Getting the fundamentals right
CTFs for Fun and Profit: Playing Games to Build your Skills
How to Treat Your Hacker (and Responsible Vulnerability Disclosure)
Making your website vulnerable for fun and security awareness
Let's hear from the Hackers: What should DOJ do next?
The Importance of Culture in Security
Human Honeypots or: How I Learned to Stop Worrying and Love the Implant
From EK to DEK: An Analysis of Modern Document Exploit Kits
Prisoner Number Six
An investigation of the security of passwords derived from African languages
Is This Magikarp a Gyarados?: Using Machine Learning for Phishing Detection
Hidden Networks Pivoting: Redefining DNS Rebinding Attack
Hacking the Pentagon: How a Rebel Alliance Shifts Culture to Protect National Security
The struggles of teaching automation
Hacking from Above: A Brief Guide for Transitioning to Leadership
The SOC Counter ATT&CK
From email address to phone number
Excuse Me, Your Sword Is In My Eye: Responding to Red Teams and Intrusions in 2019 and Beyond
(Im)proper Database Authentication
Old things are new again: efficient automatic signature generation for malware classification
Low & Slow - Techniques for DNS Data Exfiltration
Certification and Labeling in IoT
The drunk colonel and the flipped stone: Game Theory for a Defensive Strategic Advantage
Noobs: Training the Next Generation of Security Engineers
Virtual Breakpoints for x86_64
Escape the Questionnaire Quagmire: A thoughtful approach to addressing security inquiries from customers and prospects
Who dis? The Right Way To Authenticate
Reduce, Reuse and Recycle ML models - and the security powers is yours
Windows 10 DFIR Challenges
Startup Security Leadership: Lessons to Level Up from Fortune 100 to Tech Startup
Real World Security in a Clinical Healthcare Environment: Hacking a Hospital
I’m a hunter! But what does that mean?
Certification and Labeling for IoT
Pentesting ICS 102
Finding Evil with Mitre ATT&CK and the Elastic Stack
Hands on Hacking The OWASP TOP 10 and beyond
Getting CVSS, NVD, and CVEs to Work for You: Standardizing and Scaling Your Vulnerability Risk Analysis
Breaking the Bodyguards
ROP with a 2nd Stack, or This Exploit is a Recursive Fibonacci Sequence Generator
Have You Distributed Randomness?
Exploiting Windows Group Policy for Reconnaissance and Attack
Scheming with Machines: Using ML to Support Offensive Teams
ATT&CKing Your Adversaries -- Operationalizing cyber intelligence in your own environment for better sleep and a safer tomorrow.
Why journalists and hackers need each other (a panel discussion with infosec reporters)
Cover Your A**
Cyber Deception after Detection: Safe observation environment using Software Defined Networking
Why we need a Cyber Peace Institute
At Your Service - Abusing the Service Workers Web API
CloudSec Rules Everything Around Me (C.R.E.A.M.)
Why can't we be friends? (Ask a Fed & the EFF.)
Birthday Hunting
Cyber Threat Intel & APTs 101
We the People: Providing for a 'common defence' with CVD
Deepfakes, Deep Trouble: Addressing Potential Market Manipulation Caused by Deepfakes
All that glitters isn't Chrome: Hunting for suspicious browser extensions
Baited Canaries - Monitoring attackers with active beacons
HAM License Exams
State of DNS Rebinding - Attack & Prevention Techniques and the Singularity of Origin
Meet the Nation This Week on Sunday: A Special Vulnerability Edition
Scratching the Surface of Risk
Musings of an Accidental CISO
No IOUs with IOT
Securing Fast (and Furious) DevOps pipelines
"Hackers of the world - unite?"
Please inject me, a x64 code injection
Closing Ceremonies
Friends of Bill W (Sat.)
BSidesLV Pool Party