10 Words to Stop Using Now
10 Words to Stop Using Now (Workshop)
Attendee Reception
Bootstrapping A Security Research Project
Deconstructing The Cyber Kill Chain of Angler Campaign
Defending the Cloud from the Full Stack Hack
Developing a Threat Modeling Mindset
DGA Antivenom: Stopping new configurations before analysis
Don’t Touch Me That Way
Emerald City of Cyber Security
Evening Networking Reception
How security changes in the cloud and why you care
httpillage: calling all nodes
Improving your protection by automating real world attacks
Insider Threats: Evil Employees and the Nation-states and Competitors who Love Them
Key Attribute Risk Management and Analysis (KARMA)
Learning from Crises: Roles, Risks, and Rewards on the Road to Recovery
Lightning Talks
Making Change from Assessments that is not just Monetary
Mr. Human - Vulnerability Management from the Attacker’s Perspective
Nightmares of a Pentester
Opening Remarks
Personal Development Panel
Play Through the Pain? - The Impact of Forbidden Knowledge on Security and Intelligence Professionals
Raffle Prizes and Closing Remarks
Role Playing with Intermediate Representations
Side Channel Defense with Intel Cache Allocation Technique
Social Media Risk Metrics
Speed Networking
Talk Security to Me: Case Studies for Communicating Security Issues
The Art of Crisis Management
The Bad Guys Have Your Pacemaker: How to Stop Attacks on Your IoT Devices
The Cybersecurity Education Gap - What Do We Do Now?
The Topology of Malicious Activity in IPv4
Toward Consistent, Usable Security Risk Assessment of Medical Devices
Upstream without a paddle - lessons learnt!
Why is Network Access Control So Hard? Is there a Better Way?
Workshop