A Brief History of Physical Security - Schuyler Towne
Adversarial Decision Making in Critical Infrastructure Cyberattacks
Adversarial Resilience at the Planetary Scale
Analyzing the Chemistry of Data
Android App Pitfalls
Attacking Cloud Services with Source Code
Attacking NFC Mobile Wallets: Where Trust Breaks Down
Big Data? Big Liability!
Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques
Blitzing with your Defense
Bring Your Own Device: Keeping it Simple and Effective
Building Your Own Packet Capture Platform
CANCELLED - An Examination of String Allocations in Internet Explorer 9
CANCELLED - I Built My House On Sand - Embedded Security at the Firmware Layer
CANCELLED - Let's Write Some IOS Malware
Closing Remarks
"Cyber" Momentum: Understanding & Leveraging the National Cybersecurity Policy Debate
Data Analysis and Visualization for Security Professionals
Distributed Security: Expanding the Toolkit for Institutional Resilience
Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics)
Fireside Chat with Dan Geer and Richard Thieme
Games We Play: Payoffs & Chaos Monkeys
"Hacking Back" is a Bad Idea
Herding Lizards: How to avoid Security Subsistence Syndrome
Hooked on Packets: Reading Pcaps for D students
HTTP Header Hunting - A Behavioral Approach to Malware Detection
Insider Threat: Hunting for Authorized Evil
Inside the Black Hole Exploit Kit (BHEK)
JavaScript Pitfalls
Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World
No-Knowledge Crypto Attacks
Opening Keynote
Protecting sensitive information on iOS devices
Punch and Counter-punch with .Net Apps
Pwnie Express presents Practical MitM Pentesting
Rise in ATM Compromises
Speed Networking
Strategic Analysis of the iOS Jailbreak Development Community
Suicide Risk Assessment and Intervention Tactics
The Base Rate Fallacy: Information Security Needs To Understand This.
Theory and Application of Realistic Capture the Flag Competitions
Third Party Security Assurance: The Service Provider Perspective
Wait! Wait! Don't Pwn Me!
We have seen the future, and it is not pretty