REGISTRATION AND BREAKFAST
The Dirty Secrets of Enterprise Security
Red is the new Blue - Defensive Tips & Tricks from a Defender turned Pentester.
Youth Code Jam: A new way to engage kids, parents and professionals around coding
phishing social networks
Honey, I can't find the Remote!
Introducing Gophish: Taking Open-Source Phishing Up a Notch
Secure All The Things
The Evolution of Firewalls
IoT on Easy Mode (Getting started in reverse engineering embedded electronics)
Vulnerability Management Systems Flawed - Leaving your Enterprise at High Risk
Privacy InAction: A Real-World Wi-Fi Study with a Raspberry Pi
"01001000 01100101 01101100 01101100 01101111" Digital Natives : Citizenship Advice from a Digital Immigrant
LUNCH AND TURBO TALKS MODERATED BY SAHA
Maneuvering Management Madness
Exploit Kits and Indicators of Compromise
Connections: Eisenhower and the Internet
Play all the CTFs: You should be playing in Capture the Flag competitions
Darknet 101: Offerings & Protecting Yourself
"I'm a software developer. What do you mean I'm on the blue team?"
TLS Certificates and Encryption
Blue Team CCDC - Why aren't you already planning to be on the team?
You've Got Fail!
Incident Response just got a whole lot easier and will save you Logs of $$$
Spy Game: Red Teaming In The Real World
Breaking Down the Ukrainian Power Grid Cyber Attack
AFTER PARTY IN PUB