Far hallway beyond rotunda, second-to-last room
Diamonds, Fitness and Cults: Manipulation for Fun and Profit
Vulnerability & Exploit Trends: A Deep Look Inside The Data
EC2 or Bust – How to Build Your Own Pen Testing Lab in Amazon EC2
Techniques for Escaping the AppSec Labyrinth
The Erudite Inebriate’s Guide to Life, Liberty, and the Purfuit of Happinefs
Hack the Hustle! Career Strategies for Information Security Professionals
Information Sharing, or “I’ve got 99 problems and they’re probably pretty similar to yours”
Convincing Your Management, Your Peers, and Yourself That Risk Management Doesn’t Suck
How embracing social media helped me stop the hackers, save the world and get the girl!
Malware Automation
Popping the Penguin: An Introduction to the Principles of Linux Persistence
Network Survival WCS
The Slings and Arrows of Open Source Security
What if Petraeus was a hacker? Email privacy for the rest of us.
After Party