Opening Remarks
IT Security Operations: Successful Transformation
Exploitation Trends: From Potential Risk to Actual Risk
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Incoming Threats At the Speed of Retail
There’s no such thing as a coincidence - Discovering Novel Cyber Threats
Peeling The Layers Of Vawtrak
2015 State of Vulnerability Exploits
Advanced Threat Analytics: Adapt as Fast as Your Enemies
Mitigating the Alert - Impact Prevention in a super active security battlefield
Browser and Environment Hardening
Taking back Endpoint Control!
Detecting the Bear in Camp: How to Find Your True Vulnerabilities
The State of Software Security
Globalization of Cybercrime
Malware Activity in Mobile Networks – An Insider View
Confessions of a Professional Cyber Stalker
Complete Application Ownage via Multi-POST XSRF
CISO Survival Guide: How to thrive in the C-Suite and Boardroom
Building an Effective Vulnerability & Remediation Management Program
Changing the Game of Threat Hunting
Automation is your Friend: Embracing SkyNet to Scale Cloud Security
UNMASKING MALWARE
Breaking Access Controls with BLEKey
Make Metrics Matter
Security for non-Unicorns
One Ring to Rule Them All - Hardware isolation and the future of virtualization security
Stealth Attack From The Produce Aisle
Making & Breaking Machine Learning Anomaly Detectors in Real Life
Drug Pump and Medical Device Security
What does it take to deliver the most technologically advanced Games ever?
Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things
Building Better Indicators: CrowdSourcing Malware IOCs
Reception