Registration and Coffee
Keynote: The State of Security BSides
Exploit Development with Metasploit
Ambush - Catching Intruders at Any Point
How I managed to break into the InfoSec World with only a tweet and an email
Arizona Craigslist Hookers (and other dating website shenanigans)
Max Level Web App Security
Breaking Microsoft Dynamics Great Plains - an insiders guide
When Devices Rat Us Out
Big Data's Fourth V: Or why we'll never find the Loch Ness Monster
Lotus Notes Password Hash Redux
TBA day of Conference
Empirical Exploitation
How I Learned To Stop Worrying And Love The Smart Meter
Why have we not fixed the ID problem
Beyond Social Engineering: Violating Trust Models Through Marketing
Puzzle Competitions and You
Shot With Your Own Gun: How Appliances are Used Against You
TBA day of Conference
Introducing 'Android Security Evaluation Framework' - ASEF
Mirror Mirror -- Reflected PDF Attacks Using SQL Injection
Global Loot
RFID LOL
Introducing the Smartphone Penetration Testing Framework
Sexy Defense