10 Words to Stop Using Now
10 Words to Stop Using Now (Workshop)
Bootstrapping A Security Research Project
Deconstructing The Cyber Kill Chain of Angler Campaign
The Topology of Malicious Activity in IPv4
Emerald City of Cyber Security
The Cybersecurity Education Gap - What Do We Do Now?
Mr. Human - Vulnerability Management from the Attacker’s Perspective
httpillage: calling all nodes
Talk Security to Me: Case Studies for Communicating Security Issues
Social Media Risk Metrics
Why is Network Access Control So Hard? Is there a Better Way?
Making Change from Assessments that is not just Monetary
Key Attribute Risk Management and Analysis (KARMA)
Side Channel Defense with Intel Cache Allocation Technique
Learning from Crises: Roles, Risks, and Rewards on the Road to Recovery
Personal Development Panel
Lightning Talks
Raffle Prizes and Closing Remarks