Mobile App Attack (3)
Pentesting Industrial Control Systems : Capture the Flag!
Hunting high-value targets in corporate networks.
Don't Repeat Yourself: Automating Malware Incident Response for Fun and Profit
Ground Truth Keynote: Great Disasters of Machine Learning
Hacking Is Easy, Hiring Is Hard: Managing Security People
IATC Day 2: Introduction and Overview
Crafting tailored wordlists with Wordsmith
Mapping the Human Attack Surface
Ask The EFF
Uncomfortable Truths
A Noobs Intro Into Biohacking, Grinding, DIY Body Augmentation
No Silver Bullet. Multi contextual threat detection via Machine Learning.
Powershell-Fu – Hunting on the Endpoint
Survey says… Making progress in the Vulnerability Disclosure Debate
Making Password Meters Great Again
Stop the Insanity and Improve Humanity: UX for the Win
Domains of Grays.
Owning Your Career on a Daily Basis
There is no security without privacy
Why Can't We Be Friends?
Labeling the VirusShare Corpus: Lessons Learned
Improving Your Personal Value Proposition to Take that Next Step in Your Career
Proactive Password Leak Processing
You Don't See Me - Abusing Whitelists to Hide and Run Malware
Six Degrees of Domain Admin - Using BloodHound to Automate Active Directory Domain Privilege Escalation Analysis
The Future of BSides
Determining Normal: Baselining with Security Log and Event Data
Uncomfortable Approaches
Modeling Password Creation Habits with Probabilistic Context Free Grammars
Automated Dorking for Fun and Pr^wSalary
Mobile App Attack (4)
Hands-on Cryptography with Python
How to Rob a Bank – or The SWIFT and Easy Way to Grow Your Online Savings Account
Latest evasion techniques in fileless malware
Is that a penguin in my Windows?
Hacking Megatouch Bartop Games
CyPSA Cyber Physical Situational Awareness
Hacking Tech Interviews
Passphrases for Humans: A Cultural Approach to Passphrase Wordlist Generation
PLC for Home Automation and How It Is as Hackable as a Honeypot
That Which Must Not Be Spoken Of: A Personal Look at Mental Health in Infosec
Exploiting the Recruitment Process
Automation Plumbing
PeerLyst Meet and Greet
IATC Closing
Building an EmPyre with Python.
An Evolving Era of Botnet Empires
Dominating the DBIR Data
Common Mistakes Seen in Interviews
PAL is your pal: Bootstrapping secrets in Docker
Digging into SIEM Alerts with Visual Graph Analytics
Stealing Food From the Cat's Mouth
Scalability: Not as Easy as it SIEMs
One Compromise to Rule Them All
Cross-platform Compatibility: Bringing InfoSec Skills into the World of Computational Biology
QUESTIONING 42: Where is the “Engineering” in the Social Engineering of Namespace Compromises?
The Deal with Password Alternatives
Ethical implications of In-Home Robots
Why Snowden’s Leaks Were Inevitable