Opening Remarks, day 2
Security is Essential to Privacy - But is not enough ... Enter Privacy by Design
DevOps For The Home
Stealthier Attacks and Smarter Defending with TLS Fingerprinting
Hijacking Arbitrary .NET Application Control Flow
Dolla Dolla Bill Y’all: Cybercrime Cashouts
Ground Zero Financial Services: Targeted Attacks from the Darknet
Advanced Threats: Eliminating the Blind Spot
Ensuring the Success of Your IAM Project
Knowing what happened is only half the battle.
SIEM and the Art of Log Management
Effective Ways to Tackle Vulnerability Remediation
The Internet of Bad Things and Securing the Software Defined Data Center
Certifi-gate: Has your Android device been Pwned?
Exposing Advanced Threats: How big data analytics is changing the way advanced threat defense is deployed, managed and measured
Maturing InfoSec: Lessons from Aviation on Information Sharing
What Google knows about you and your devices, and how to get it
Software Defined Networking / Attacker Defined Networking
Breaking and Fixing Python Applications
Bulletproofing Your Incident Response Plan: Effective Tabletops
Preventing Home Automation Security Disasters
Insider Threat – The Soft Underbelly of CyberSecurity
Cymon - An Open Threat Intelligence System
Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities
Learning To Love Your Attackers
The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight!
Agile Incident Management - Bringing the “Win” Back to Data and Privacy Breach Responses
Business Backed CVEs - The Major Vulnerabilities of the Past Year
Closing Remarks