Herding Lizards: How to avoid Security Subsistence Syndrome
Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World
No-Knowledge Crypto Attacks
Data Analysis and Visualization for Security Professionals
Protecting sensitive information on iOS devices
Adversarial Decision Making in Critical Infrastructure Cyberattacks
A Brief History of Physical Security - Schuyler Towne
Blitzing with your Defense
HTTP Header Hunting - A Behavioral Approach to Malware Detection
Building Your Own Packet Capture Platform
Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics)
Attacking NFC Mobile Wallets: Where Trust Breaks Down
Wait! Wait! Don't Pwn Me!
Closing Remarks