Hacking the Hustle Hands-On, Infosec Resume and Career Strategies
Wireless Essentials (Tue)
Opening Keynote -- Beyond Good and Evil: Towards Effective Security
USB write blocking with USBProxy
SHA-1 backdooring and exploitation
The Power Law of Information
#edsec: Hacking for Education
Skull And Bones (And Warez) - Secret Societies of the Computer Underground (and why you should create one too)
So, you want to be a pentester?
Evading code emulation: Writing ridiculously obvious malware that bypasses AV
Measuring the IQ of your Threat Intelligence feeds
Allow myself to encrypt...myself!
Custodiet watches your packets! The Open Source MSSP Framework
Securing Sensitive Data: A Strange Game
What reaction to packet loss reveals about a VPN
Security Management Without the Suck
Strategies Without Frontiers
Brick in the Wall vs Hole in the Wall
C.R.E.A.M. – The Art of Social Engineering Report Writing
Master Serial Killer
Cut the sh**: How to reign in your IDS.
Untwisting the Mersenne Twister: How I killed the PRNG
Vulnerability Assessments on SCADA: How i 'owned' the Power Grid.
501(c)(3) for (un)fun and (non)profit
Geek Welfare -- Confessions of a Convention Swag Hoarder
ClusterF*ck - Actionable Intelligence from Machine Learning
No InfoSec Staff? No Problem.
Anatomy of memory scraping, credit card stealing POS malware
Malware Analysis 101 - N00b to Ninja in 60 Minutes
Protecting Data – How Cultural-Political Heritage Shapes Security Approaches
Know thy operator
Can I Code Against an API to Learn a Product?
Bridging the Air Gap: Cross Domain Solutions
Cluck Cluck: On Intel's Broken Promises
Travel Hacking With The Telecom Informer
FAP Fully Automated Pwning Techniques for Automated Reversing
Improving security by avoiding traffic and still get what you want in data transfers
Back Dooring the Digital Home
The Semantic Age - or - A Young Ontologist's Primer