Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools
Pentesting PLCs 101
(Un)Keynote: INCITE CLUB: WendyLady vs. ErrataRob or, “Fly THIS Sideways!”
Injection on Steroids: Code-less Code Injections and 0-Day Techniques
Barely Legal: the Hacker’s Guide to Cybersecurity Legislation
Verum - How Skynet Started as a Context Graph
Practical Application Whitelisting Evasion
A Security/Usability Review of Wordpress 2FA Plugins
Speaking Metrics to Executives
Underground Wi-Fi Hacking for Web Pentesters
I Am The Cavalry Track Introduction and Overview
The story of L0phtCrack
Dropping hell0days: Business Interaction for Security Professionals - Or Anyone Else
Hack the Future
Getting the data out using social media
When steganography stops being cool
Practice Safe Cyber: The Miseducation of American Students on Internet Safety
Leading in a "Do"-ocracy
An introduction of the Kobra, a client for the Badger version 2.0, providing tactical situational awareness, physical tampering protection, and automatic process mitigation
Pentesting with Docker
Violent Python
Exploit Kit Shenanigans: They’re Cheeky!
Analogue Network Security
Pushing on String: Adventures in the 'Don't Care' Regions of Password Strength
The Internet of ... Mainframes?! WTF?
Check That Certificate
#radBIOS: Wireless networking with audio
State of Medical Device Cyber Safety
The Journey To ICS
How can we ensure safer Medical Devices?
NSA Playset: Bridging the Airgap without Radios
Don’t hate the Disclosure, Hate the Vulnerability: How the government is bringing researchers and vendors together to talk vulnerability disclosure.
What would fix passwords? Some weekly password audits. Pretty graphs to prove it! (A Haiku)
What's New Pussycat: Recent Improvements to Powercat
Catching Linux Post-Exploitation with Auditd
I Amateur Radio (And So Can You!)
Breachego
Adding +10 Security to Your Scrum Agile Environment
How to WCTF
How Portal Can Change Your Security Forever
Crema: A LangSec-inspired Language
Hacking Our Way Into Hacking
Tell Me Who You Are, and I Will Tell You Your Lock Pattern
Fight back – raising awareness @infosec
State of Automotive Cyber Safety
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
What the heck is this radio stuff, anyway?
How can we ensure safer Automobiles?
Your Electronic Device, Please: Understanding the Border Search Exception & Electronic Devices
Angler Lurking in the Domain Shadows
Making & Breaking Machine Learning Anomaly Detectors in Real Life
Poppin' (Digital) Locks
Stress, Burnout, Rinse, Repeat
SIEMple technology
Privileges in the Real World: Securing Password Management
How I learnt hacking in highschool