501(c)(3) for (un)fun and (non)profit
A Better Way to Get Intelligent About Threats
Allow myself to encrypt...myself!
Anatomy of memory scraping, credit card stealing POS malware
A Place to Hang Our Hats: Security Community and Culture
Ask the EFF
Attacking Drupal
Back Dooring the Digital Home
Black Magic and Secrets: How Certificates Influence You!
Booze, Devil's Advocate, and Hugs: the Best Debates Panel You'll See at BSidesLV 2014
Brick in the Wall vs Hole in the Wall
Bridging the Air Gap: Cross Domain Solutions
Bring your own Risky Apps
Building Skills, Understanding and Influencing People
Business lessons that made me a better Security Professional
Can I Code Against an API to Learn a Product?
Closing Keynote
Cluck Cluck: On Intel's Broken Promises
ClusterF*ck - Actionable Intelligence from Machine Learning
C.R.E.A.M. – The Art of Social Engineering Report Writing
Custodiet watches your packets! The Open Source MSSP Framework
Cut the sh**: How to reign in your IDS.
Demystiphying and Fingerprinting the 802.15.4/ZigBee PHY
#edsec: Hacking for Education
Evading code emulation: Writing ridiculously obvious malware that bypasses AV
FAP Fully Automated Pwning Techniques for Automated Reversing
Fuck These Guys: Practical Countersurveillance
Geek Welfare -- Confessions of a Convention Swag Hoarder
Hackers vs Auditors
Hacking the Hustle Hands-On, Infosec Resume and Career Strategies
Improving security by avoiding traffic and still get what you want in data transfers
Insider Threat Kill Chain: Human Indicators of Compromise
Introduction and Overview: I Am The Cavalry and Empowering Researchers
Invasive Roots of Anti-Cheat Software
iOS URL Schemes: omg://
Know thy operator
Malware Analysis 101 - N00b to Ninja in 60 Minutes
Master Serial Killer
Measuring the IQ of your Threat Intelligence feeds
No InfoSec Staff? No Problem.
Oops, That Wasn't Suppossed To Happen: Bypassing Internet Explorer's Cross Site Scripting Filter
Opening Keynote -- Beyond Good and Evil: Towards Effective Security
Problem Space Overview: I Am The Cavalry
Protecting Data – How Cultural-Political Heritage Shapes Security Approaches
Pwning the hapless or How to Make Your Security Program Not Suck
Pwning the Pawns with WiHawk
Reverse Engineering Mac Malware
RFID Hacking
Ripped from the Headlines What the news tells us about Information Security Incidents
Secret Pentesting Techniques Part Duex
Securing Sensitive Data: A Strange Game
Security Management Without the Suck
Security testing for Smart Metering Infrastructure
SHA-1 backdooring and exploitation
Skull And Bones (And Warez) - Secret Societies of the Computer Underground (and why you should create one too)
So, you want to be a pentester?
Strategies Without Frontiers
Teach a man to Phish...
The Lore shows the Way
The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State
The Power Law of Information
The Savage Curtain
The Semantic Age - or - A Young Ontologist's Primer
The untold story about ATM Malware
Third-Party Service Provider Diligence: Why are we doing it all wrong?
Training with Raspberry Pi
Travel Hacking With The Telecom Informer
Untwisting the Mersenne Twister: How I killed the PRNG
USB write blocking with USBProxy
Using Superpowers for Hardware Reverse Engineering
Vaccinating Android
Vulnerability Assessments on SCADA: How i 'owned' the Power Grid.
We Hacked the Gibson! Now what?
What I've Learned As A Con-Man
What reaction to packet loss reveals about a VPN
Why am I surrounded by friggin' idiots?!? (Because you hired them!)
Wireless Essentials (Tue)
Wireless Essentials (Wed)
You Hack, We Capture: Attack Analysis with Honeypots