SCADA Protection: Imminent Phishing Attacks and The U.S. Cyber Strategy
SSL++ : Tales of Transport Layer Security at Twitter
“I want my PC back!”: An in-depth look at ransomware
Why are we still vulnerable to side channel attacks? (and why should I care?)
Strategic Cyber Security & Warfare: If We Don’t Get It Right, People Die
Building a Security Graph
Chinese Advanced Persistent Threats: Corporate Cyber Espionage Processes and Organizations
Sorry Your Princess is in Another Castle: Intrusion Deception to Protect the Web
Cash Rules Everything Around Me: The Commercialization of Online Spying
Press Start: The basics of malware analysis
Google-jacking: A review of Google’s 2-Factor Authentication
RFID Credentials or (Cyber Pearl 9/11 Harbor of DOOM)
My First Incident Response Team: DFIR for Beginners
Sunday Keynote