Adversary Profile: Gothic Panda
All That Cybers Is Not War
A Swift Teardown
Before and Beyond the Breach: New Research in the 2015 DBIR
Bugged Files: Is Your Document Telling on You?
Building a Hub for Cybersecurity: New England’s Tech Drive
Closing Remarks - Thur.
Cognitive Injection
Cyber Information Sharing -- A Means, not an End
Defending the Enterprise with Evernote
Embedded Insecurity: Can We Fix The Internet of Evil Things?
Evolution of Threat
Excavating for Empathy
From Tech to Exec (Panel)
Getting the most from your managed security providers
Growing Up: A Maturity Model and Roadmap for Vulnerability Management
Hacking the Media for Fun and Profit
Improving the State of Healthcare Information Security as a Security Investigator
iOS App Analytics VS Privacy: An analysis of the use of analytics
iROP - Interesting ROP gadgets
Keynote - Thur. Afternoon
Keynote - Thur. Morning
Keynote - Wed. Afternoon
Keynote - Wed. Morning
Know the Enemy: Understanding the Adversarial Mindset
Lightning Talks (Vendor Room)
Monitoring Social Media in 5 Minutes a Week
MQTT, CoAP, and Building Secure Things
Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols
Opening Remarks - Thur.
Opening Remarks - Wed.
Penetration Testing in the Cloud
Protecting your cloud server with a cloud IDS
Quantifying cyber attacks - to optimize and assess your defense
Reactive JS Security Testing & Exploitation
Selling for Security Professionals
Speed Networking
Using NLP to detect phishing and APT CnC domains
Who Watches the Watchers? Metrics for Security Strategy.