Radare2 an open source reverse engineering framework
You Hack, We Capture: Attack Analysis with Honeypots
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
A hackers guide to using the YubiKey - how to add inexpensive 2-factor authentication to your next project.
Have I seen you before?
Security Questions Considered Harmful
All You Need Is One: A ClickOnce Love Story
ZOMG It's OSINT Heaven!
Introduction to the Career Track
Being the Paid Expert in the Room: Consulting for a Company or On Your Own
I Forgot My Password
Classic Misdirection: Social Engineering to Counter Surveillance
WiFi Pineapple: Winning the WiFi Battlefield
It’s All Geek to Me
Securing the Everything Store: Challenges, Opportunities and Rewards
TAPIOCA (TAPIOCA Automated Processing for IOC Analysis)
Haking the Next Generation
Who Watches the Watchers? Metrics for Security Strategy
Harvesting Passwords from Source Code, Scripts, and Code Repositories
Bio-Hacking: Implantable chip attack vector
Phishing: Going from Recon to Credentials
Did you make a difference today?
Social Media in Incident Response Program
Better Spectrum Monitoring with Software Defined Radio
Backdooring MS Office documents with secret master keys
Advancing Internet Security Research with Big Data and Graph Databases
Towards Standardizing Comparisons of Password Guessability
Cats and Mice - Ever evolving attackers and other game changerse
Building an Empire with PowerShell
Yes, you too can perform daring acts of Live Acquisition.
Intro to Data Science for Security
Android App Security Auditing
Open Up A Can of OSINT On 'Em
Stronger Password-Based Encryption Using I/O Hardness
Fishing To Phishing - It’s all about slimy creatures.
FAA, FTC, FCC - FU: How Three F'ing Agencies are Shaping Info Sec
Wi-Door - Bind/Rev Shells for your Wi-Fi
All Your RFz Are Belong to Me - Software Defined Radio Exploits
Welcome back, Emcee sets tone for the afternoon
Interview Role Play
Auth for Encrypted Services with Server Side APT
+10 Knowledge: Sharing What You Learn For the Benefit of the Everyman.
For love of country: 15 years of Security Clearance Decisions
Insider Tricks for Bug Bounty Success
Blind Hashing
Maximizing Bro Detection
Software-Defined Radio Signal Processing with a $5 Microcontroller.
Security Engineering At Amazon
PBKDF2: Performance Matters
Embedding Web Apps in MITMProxy Scripts
Sue the Fed, Hack your FBI File
Life at a Startup, Tales From the Trenches: The Good, the Bad and the Ugly
It’s Not Just Your Answer: Hacking Tech Interviews
Remote Access, the APT
Rethink, Repurpose, Reuse... Rain Hell
No More Fudge Factors and Made-up Shit: Performance Numbers That Mean Something
Password Alert by Google
Actionable Threat Intelligence: ISIS, SuperBall, SuperFish, and your less magical 8-ball
What Lurks in the Shadow
Infosec careers, myth vs. reality
Some things you just can’t find on Google.
No More Graphical Passwords
Out of Denial: A 12-Step Program for Recovering Admins
Longevity in InfoSec – Turning Passion into Expertise & Respect
Crash The IoT Train Yourself: Intentionally Vulnerable WRT (IV-WRT)
Why does InfoSec play bass? And other observations about hacker culture.
AI and CND - implications for security in the era of Artificial Intelligence
How Secure Are Multi-Word Random Passphrases?
Ask the EFF
Why We Can't Have Nice Things: Original Research on Conflict Resolution Styles in Information Security & Risk Management
Common Mistakes that Engineers make while Interviewing in a “Hot” market
Are You Sure That You Still Need Passwords?
Serial Box - Primer for dealing with Serial and JTAG for basic hardware hacking
Closing remarks and thanks from our Emcee