Opening Remarks - Wed.
Keynote - Wed. Morning
iROP - Interesting ROP gadgets
Adversary Profile: Gothic Panda
Evolution of Threat
Reactive JS Security Testing & Exploitation
Penetration Testing in the Cloud
Getting the most from your managed security providers
Bugged Files: Is Your Document Telling on You?
Using NLP to detect phishing and APT CnC domains
Quantifying cyber attacks - to optimize and assess your defense
MQTT, CoAP, and Building Secure Things
Growing Up: A Maturity Model and Roadmap for Vulnerability Management
Excavating for Empathy
A Swift Teardown
Embedded Insecurity: Can We Fix The Internet of Evil Things?
iOS App Analytics VS Privacy: An analysis of the use of analytics
Defending the Enterprise with Evernote
Building a Hub for Cybersecurity: New England’s Tech Drive
Keynote - Wed. Afternoon