Welcome
Attack of the Clichés
Cleaning up Magical Crypto Fairy Dust with Cryptanalib and FeatherDuster
Sharing is Caring: Understanding and measuring Threat Intelligence Sharing Effectiveness
Overcoming Imposter Syndrome (even if you’re totally faking it)
OPSEC on the Darkweb: The good, the bad and the ugly
You sunk my battleship!
Turning Credential Harvesting Into Credential Clearcutting: Phishing 2FA Systems
Securitygenic: Fighting User Apathy and Indifference
Prime Time Cyber Heists – Reporting from the Trenches!
Privacy's Past, Present and Future
Don't be stupd on GitHub
Playing with Pictures: Adult Coloring on the Internet
35 Years of Cyberwar: The Squirrels are Winning
ARRR Maties! A map to the legal hack-back
Improving mobile security with forensics, app analysis and big data
Social Untrust
Hack All the Candidates
Security ResPWNses - Do and Donts of security disclosures
Closing - Day 1