Running a CTF: Panel and Discussion on the Art of Hacker Gaming
C10M – Defending the Internet At Scale
Paparazzi Over IP
Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
Introduction to Vulnerability Assessment
DIY: Using Trust To Secure Embedded Projects
Moloch: A New And Free Way To Index Your Packet Capture Repository
Openstack Security Brief
Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration
Generalized Single Packet Authorization For Cloud Computing Environments
From "Shotgun Parsers" to Better Software Stacks
The Computer Fraud and Abuse Act: Swartz, Auernheimer, and Beyond
Android Forensics and Security Testing
Malware Analysis: Collaboration, Automation & Training
Bright Shiny Things = Why We Need Intelligent Data Access Controls
Ten Strategies of a World-Class Computer Security Incident Response Team
Armor For Your Android Apps
Protecting Sensitive Information on iOS Devices
Beyond Nymwars: An Analysis Of The Online Identity Battleground
The Life of Binaries
Introduction to Trusted Computing
How Smart Is Bluetooth Smart?
Chopshop: Busting The Gh0St
The Cloud - Storms On The Horizon
Rootkits: What They Are, and How to Find Them
0wn The Con
PunkSPIDER: An Open Source, Scalable Distributed Fuzzing Project Targeting The Entire Internet
Crypto: You're Doing It Wrong
Introduction to Software Exploits
Introduction to Software Reverse Engineering
Exploits 2: Exploitation in the Windows Environment
Drones: Augmenting your cyber attack tool bag with aerial weapon systems
Managed Service Providers: Pwn One and Done
Reverse Engineering Malware
No Tools? No Problem! Building a PowerShell Botnet
Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling
Protecting Big Data From Cyber APT in the Cloud
Writing a Thumbdrive for Active Disk Antiforensics