Security Hopscotch
HardenedBSD Internals
Welcome to the Family - Intro
People Buy You
Keynote Panel - Information Security Today and in the Future
The M/o/Vfuscator - Turning ‘Mov’ into a Soul-crushing RE Nightmare
APT Cyber Cloud of the Internet of Things
When A Powerful Platform Benefits Both Attackers and Defenders: Secure Enhancements to Scripting Hosts in Windows 10
How Not to Infosec
Shooting Phish in a Barrel and Other Fish Related Puns
Don’t Laugh - I Dare You!
And You Shall Know Me By My Trail of Documentation
Stealthier Attacks and Smarter Defending with TLS Fingerprinting
A Deep Look into a Chinese Advanced Attack - Michael Gough
Python for InfoSec
Marketers are Friends - Not Food
Blue Team Starter Kit
Gadgets Zoo: Bypassing Control Flow Guard in Windows 10
Honeypots for Active Defense
Pavlovian Security: How to Change the Way Your Users Respond When the Bell Rings
Dog the Freaking (OSINT) Bounty Hunter - Helping Law Enforcement Catch Criminals For (Mostly) Fun - And (Probably No) Profit
Simplified SIEM Use Case Management
Bypassing 2Factor Auth with Android Trojans
Red vs. Blue: Modern Active Directory Attacks & Defense
Manufactorum Terminatus - The Attack and Defense of Industrial Manufacturers
The State of Information Security Today
Current Trends in Computer Law
Putting the Management into Vulnerability Management (or - YOU’VE GOT BEARS!!!)
Moving Target Defense - Learning from Hackers
Metasploit Town Hall
High Stake Target: Lo-Tech Attack
Learning Through Mentorship
Spanking the Monkey (or How Pentesters Can Do It Better!)
Malfunction’s Functions : Automated Static Malware Analysis Using Function Level Signatures
We Owe You Nothing
Red Teaming Enemy of the State
Operating in the Shadows
The Law of Drones
On Defending Against Doxxing
Backdooring Git
Detecting Phishing Attacks with DNS Reconnaissance
$helling Out (Getting Root) on a ‘Smart Drone’
Getting Started with PowerShell
The Phony Pony: Phreaks Blazed The Way
Practical Windows Kernel Exploitation
Hacking Web Apps
Sticky Honey Pots
Phishing: Going from Recon to Creds
HackerQue
Hijacking Label Switched Networks in the Cloud
Top Ten is Old Skool - Meet the New Age of AppSec
Cryptography and You