Opening Ceremony
TBA
The Wild West
Black Ops
Cyber Fast Track: from the trenches
Securing the Internet: YOU’re doing it wrong. (An INFOSEC Intervention)
Rescuing the Prince of Persia from the Sands of Time
2FA-Enabled Fraud: Dissecting Operation High Roller
House of Cards
Business Ramifications of Internet’s unclean conflicts
How I Owned Your Vending Machine
Dirty Little Secrets Part 2
Nonverbal Human Hacking
The Hacker Ethos meets The FOSS Ethos
How screwed are we?
The Patsy Proxy: Getting others to do your dirty work
BYOD: “Bring Your Own Doom or Sane Business Decision?”
SexyDefense – The Red Team tore you a new one. NOW WHAT?
Privilege Escalation with the Metasploit Framework
Hacking Survival: So. You want to compute post-apocalypse?
Doubt – Deceit – Deficiency and Decency – a Decade of Disillusionment
The Art and Science of Hacking Any Target
Rapid Blind SQL Injection Exploitation with BBQSQL
DNS Reconnaissance
Pentesting for non-pentesters: learning through virtual machines
Collecting Underpants To Win Your Network
Is it time for another firewall or a security awareness program?