0wn the c0n - Two BSides for the price of one!
A Brief History of the Information Security Industry
Advanced Cyber Detection: Kill Chain Evolution
A tiny datacenter, On my head
Bootstrapping Threat Intelligence Out of Thin Air
Building the Next Generation of InfoSec
Cyber Intent: Cybersecurity
Data you don't store cannot be hacked!
Flow Chart Self-Defense
Hello Ransomware, Goodbye Data?
How Evil Kirk Uses Maltego
How to Recruit Purple Squirrels, Pink Unicorns and other Mythical Security Creatures. Or If You Are a Pink Unicorn, How Best to Work with Recruiters
IDS is dead, long live IDS
Incident Response Explained by Dora The Explorer and IR training Game
IoT Security
Keynote: Inside the Outsider - Deep and not so deep thoughts from an info sec lurker
Kids - Learn to Bypass Parental Controls!
Malware Analysis: N00b to Ninja in 240 Minutes
Mechanics of an ICS/SCADA Man-In-The-Middle Attack
OSINT for Fun & Games
Padawans - Hacking 101
Physical Penetration Testing (Low tech or no tech)
Practical IPv6 Setup and Security for your Home
processing 101 for kids
R2-D2 where are you?
R2-D2 where are you?
R2-D2 where are you?
Raspberry Pi, Kismet, and PCI 11.1
"Reasonable" security or are the lawyers coming?
Scratching the Surface: What We Know about Lockpicking Forensics So Far
SoHo SIGINT
Technology? Business? How do they intersect, and do I care?
Web Hacking 101 Hands-on with Burp Suite
Wireshark for Post-Incident Analysis