Opening Remarks, Rumblings, and Rants
Attacker Ghost Stories: Mostly Free Defenses That Give Attackers Nightmares
Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
The Evolution of Linux Kernel Module Signing
How Hackers for Charity (Possibly) Saved Me a Lot of Money
Introduction To Reverse Engineering Software
CCTV: Setup, Attack Vectors, and Laws
Security Analytics: Less Hype, More Data
An Introduction to Cellular Security
Dissipation of Hackers in the Enterprise
Privacy Online: What Now?
Android Forensics & Security Testing
Eyes on IZON: Surveilling IP Camera Security
Get Out of Jail Free Cards? What Aviation Can Teach Us About Information Sharing
Crossing the Streams with State Machines in IDS Signature Languages
Another Log to Analyze – Utilizing DNS to Discover Malware in Your Network
Windows Attacks: AT Is the New Black
Weaponizing Your Pets: War Kitteh and the Denial of Service Dog
Womens Tech Collective, and Gender Equality in Tech