Mobile App Attack (1)
Doxing yourself through FOIA: understanding agency data structures to reverse engineer FOIA requests.
Opening Keynote Pt. I & II
Managing Security with the OWASP Assimilation Project.
Shall We Play A Game? 30 Years of the CFAA
Data Science or Data Pseudo-Science? Applying Data Science Concepts to Infosec without a PhD
Hire Ground - Opening Remarks
IATC Introduction and Overview
Toward Better Password Requirements
Network Access Control: The Company-Wide Team Building Exercise That Only You Know About
What Snowden and I Have in Common - Reflections of an ex-NSA Hacker
Calling All Hacker Heroes: Go Above And Beyond
Intro to Storage Security, Looking Past the Server
Are You A PenTexter? Open-Sourcing Pentest Reporting and Automation.
Deep Adversarial Architectures for Detecting (and Generating) Maliciousness
Navigating Different Career Paths in Security
Panel: Progress On Cyber Safety
What's Up Argon2? The Password Hashing Winner A Year Later
Automation of Penetration Testing and the future
Breaking the Payment Points of Interaction (POI)
Welcome to The World of Yesterday, Tomorrow!
Flaying out the Blockchain Ledger for Fun, Profit, and Hip Hop
Hacking Tech Interviews
Cyber Safety And Public Policy
Rock Salt: A Method for Securely Storing and Utilizing Password Validation Data
Cruise Line Security Assessment OR Hacking the High Seas
How to securely build your own IoT enabling embedded systems: from design to execution and assessment
Mobile App Attack (2)
Active Incident Response
Security Vulnerabilities, the Current State of Consumer Protection Law, & how IOT Might Change It
Beyond the Tip of the IceBerg -- Fuzzing Binary Protocol for Deeper Code Coverage.
Exposing the Angler EK: All the Naughty Bits
Defeating Machine Learning: Systemic Deficiencies for Detecting Malware
State Of Healthcare Cyber Safety
What we've learned with Two-Secret Key Derivation
How to Get and Maintain your Compliance without ticking everyone off
Generation C: "Hacker" Kids and the Innovation Nation
#recruiterfail vs #candidatefail
State Of Automotive Cyber Safety
Operation Escalation: How Commodity Programs Are Evolving Into Advanced Threats
How to travel to high-risk destinations as safely as possible
Why it's all snake oil - and that may be ok
How to Become "The" Security Pro
I Love myBFF (Brute Force Framework)
Pushing Security from the Outside
An Adversarial View of SaaS Malware Sandboxes
Evaluating a password manager
DNS Hardening - Proactive Network Security Using F5 iRules and Open Source Analysis Tools
Ingress Egress: The emerging threats posed by augmented reality gaming.
DYODE: Do Your Own DiodE for Industrial Control Systems.
How to make sure your data science isn’t vulnerable to attack
Why does everyone want to kill my passwords?
CFPs 101
A Peek Behind Vegas Surveillance
How to Stand Out to Talent Acquisition