5,500 hackers + Your code = ???
Aligning Threats and Allies through Stories
Applied Security Metrics: Building the Financial Services Threat Report
Bit, Bit, Coin: What Virtual Money Can Tell Us About Hacking Economic & Social Systems
Case Study: How to Build an Application Security Metrics Program
Delivering Security at Big Data Scale
Diablo Security: What Can Infosec Learn from Video Games?
Hacking The US Trademark System: A Cautionary Tale
Hiring/Recruitment Workshop
How to Implement New Security Features and Fix Broken Stuff with Feature Flags and A/B Tests
How to Save the Environment, or Why Nobody Takes Your Security Advice
Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together
Information-sharing Tools, Taxonomies, and Trust: Babel or Better?
Introducing idb - Simplified Blackbox iOS App Pentesting
iOS App Reversing; a Practical Approach
IT Security Risk Assessment:Measuring What Matters
Keynote (Thursday)
Keynote (Tuesday)
Keynote (Wednesday)
Mackerel: A Progressive School of Cryptographic Thought
Marauder or Scanning your DNSDB for Fun and Profit
Measuring Security Outcomes: From Data to Insight for Third Party Risk Management
Offensive Defense through Attacker Mimicry
Painting A Company Red and Blue
Raffle Prizes and Closing Remarks
Reality Checking Your Security Testing Program
Reverse Engineering the Human OS
Ripped from the Headlines: What the news tells us about Information Security Incidents
Risk, Audit, and Compliance for Hackers & Defenders
Security Testing WITHOUT an Army of Ninjas
Setup for Failure: Defeating SecureBoot
Speed Networking
The Cavalry Isn't Coming; It Falls To Us: How you can help!
The Internet of Things: We've Got to Chat
The Privileged User Discussion: Security Enforcer or Threat?
Too Many Fallen: #SecBurnOut Pt3 "Prevention & Introspection"
Top 50 Non-State Hacker Groups of the World
Trapping Hacks With Ensnare
URL Scheme Security on iOS
Wait Wait Don't Pwn Me!