2015 State of Vulnerability Exploits
Advanced Threat Analytics: Adapt as Fast as Your Enemies
Advanced Threats: Eliminating the Blind Spot
Agile Incident Management - Bringing the “Win” Back to Data and Privacy Breach Responses
Automation is your Friend: Embracing SkyNet to Scale Cloud Security
Breaking Access Controls with BLEKey
Breaking and Fixing Python Applications
Browser and Environment Hardening
Building an Effective Vulnerability & Remediation Management Program
Building Better Indicators: CrowdSourcing Malware IOCs
Bulletproofing Your Incident Response Plan: Effective Tabletops
Business Backed CVEs - The Major Vulnerabilities of the Past Year
Certifi-gate: Has your Android device been Pwned?
Changing the Game of Threat Hunting
CISO Survival Guide: How to thrive in the C-Suite and Boardroom
Closing Remarks
Complete Application Ownage via Multi-POST XSRF
Confessions of a Professional Cyber Stalker
Cymon - An Open Threat Intelligence System
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing
Detecting the Bear in Camp: How to Find Your True Vulnerabilities
DevOps For The Home
Dolla Dolla Bill Y’all: Cybercrime Cashouts
Drug Pump and Medical Device Security
Effective Ways to Tackle Vulnerability Remediation
Ensuring the Success of Your IAM Project
Exploitation Trends: From Potential Risk to Actual Risk
Exposing Advanced Threats: How big data analytics is changing the way advanced threat defense is deployed, managed and measured
Globalization of Cybercrime
Ground Zero Financial Services: Targeted Attacks from the Darknet
Hijacking Arbitrary .NET Application Control Flow
Incoming Threats At the Speed of Retail
Insider Threat – The Soft Underbelly of CyberSecurity
IT Security Operations: Successful Transformation
Knowing what happened is only half the battle.
Learning To Love Your Attackers
Make Metrics Matter
Making & Breaking Machine Learning Anomaly Detectors in Real Life
Malware Activity in Mobile Networks – An Insider View
Maturing InfoSec: Lessons from Aviation on Information Sharing
Mitigating the Alert - Impact Prevention in a super active security battlefield
One Ring to Rule Them All - Hardware isolation and the future of virtualization security
Opening Remarks
Opening Remarks, day 2
Peeling The Layers Of Vawtrak
Preventing Home Automation Security Disasters
Run Faster, Continuously Harden - Embracing DevOps to Secure All The Things
Security for non-Unicorns
Security is Essential to Privacy - But is not enough ... Enter Privacy by Design
SIEM and the Art of Log Management
Software Defined Networking / Attacker Defined Networking
Stealth Attack From The Produce Aisle
Stealthier Attacks and Smarter Defending with TLS Fingerprinting
Taking back Endpoint Control!
The Effective Use of Cyber Ranges for Application Performance and Security Resilience – Train Like You Fight!
The Internet of Bad Things and Securing the Software Defined Data Center
There’s no such thing as a coincidence - Discovering Novel Cyber Threats
The State of Software Security
UNMASKING MALWARE
What does it take to deliver the most technologically advanced Games ever?
What Google knows about you and your devices, and how to get it
Xenophobia is Hard on Data: Forced Localization, Data Storage, and Business Realities