Opening Remarks
Play Through the Pain? - The Impact of Forbidden Knowledge on Security and Intelligence Professionals
Speed Networking
Workshop
Improving your protection by automating real world attacks
Defending the Cloud from the Full Stack Hack
Role Playing with Intermediate Representations
How security changes in the cloud and why you care
The Art of Crisis Management
Insider Threats: Evil Employees and the Nation-states and Competitors who Love Them
DGA Antivenom: Stopping new configurations before analysis
Developing a Threat Modeling Mindset
The Bad Guys Have Your Pacemaker: How to Stop Attacks on Your IoT Devices
Upstream without a paddle - lessons learnt!
Don’t Touch Me That Way
Toward Consistent, Usable Security Risk Assessment of Medical Devices
Nightmares of a Pentester
Attendee Reception
Evening Networking Reception