How I managed to break into the InfoSec World with only a tweet and an email
Breaking Microsoft Dynamics Great Plains - an insiders guide
Lotus Notes Password Hash Redux
Shot With Your Own Gun: How Appliances are Used Against You
Mirror Mirror -- Reflected PDF Attacks Using SQL Injection
Introducing the Smartphone Penetration Testing Framework
Mainframed: The Forgotten Fortress
Metrics that Suck Even Less
The Leverage of Language, or: How I realized Information Theory could save Information Security
The Blooming Social Media Economics Built on 'Fake' Identities
Lightning Talks