Active Incident Response
An Adversarial View of SaaS Malware Sandboxes
An Evolving Era of Botnet Empires
A Noobs Intro Into Biohacking, Grinding, DIY Body Augmentation
A Peek Behind Vegas Surveillance
Are You A PenTexter? Open-Sourcing Pentest Reporting and Automation.
Ask The EFF
Automated Dorking for Fun and Pr^wSalary
Automation of Penetration Testing and the future
Automation Plumbing
Beyond the Tip of the IceBerg -- Fuzzing Binary Protocol for Deeper Code Coverage.
Breaking the Payment Points of Interaction (POI)
Building an EmPyre with Python.
Calling All Hacker Heroes: Go Above And Beyond
CFPs 101
Common Mistakes Seen in Interviews
Crafting tailored wordlists with Wordsmith
Cross-platform Compatibility: Bringing InfoSec Skills into the World of Computational Biology
Cruise Line Security Assessment OR Hacking the High Seas
Cyber Safety And Public Policy
CyPSA Cyber Physical Situational Awareness
Data Science or Data Pseudo-Science? Applying Data Science Concepts to Infosec without a PhD
Deep Adversarial Architectures for Detecting (and Generating) Maliciousness
Defeating Machine Learning: Systemic Deficiencies for Detecting Malware
Determining Normal: Baselining with Security Log and Event Data
Digging into SIEM Alerts with Visual Graph Analytics
DNS Hardening - Proactive Network Security Using F5 iRules and Open Source Analysis Tools
Domains of Grays.
Dominating the DBIR Data
Don't Repeat Yourself: Automating Malware Incident Response for Fun and Profit
DYODE: Do Your Own DiodE for Industrial Control Systems.
Ethical implications of In-Home Robots
Evaluating a password manager
Exploiting the Recruitment Process
Exposing the Angler EK: All the Naughty Bits
Flaying out the Blockchain Ledger for Fun, Profit, and Hip Hop
Generation C: "Hacker" Kids and the Innovation Nation
Ground Truth Keynote: Great Disasters of Machine Learning
Hacking Is Easy, Hiring Is Hard: Managing Security People
Hacking Megatouch Bartop Games
Hacking Tech Interviews
Hacking Tech Interviews
Hire Ground - Opening Remarks
How to Become "The" Security Pro
How to Get and Maintain your Compliance without ticking everyone off
How to make sure your data science isn’t vulnerable to attack
How to Rob a Bank – or The SWIFT and Easy Way to Grow Your Online Savings Account
How to Stand Out to Talent Acquisition
How to travel to high-risk destinations as safely as possible
Hunting high-value targets in corporate networks.
IATC Closing
IATC Day 2: Introduction and Overview
IATC Introduction and Overview
I Love myBFF (Brute Force Framework)
Improving Your Personal Value Proposition to Take that Next Step in Your Career
Ingress Egress: The emerging threats posed by augmented reality gaming.
Intro to Storage Security, Looking Past the Server
Is that a penguin in my Windows?
Labeling the VirusShare Corpus: Lessons Learned
Latest evasion techniques in fileless malware
Making Password Meters Great Again
Managing Security with the OWASP Assimilation Project.
Mapping the Human Attack Surface
Modeling Password Creation Habits with Probabilistic Context Free Grammars
Navigating Different Career Paths in Security
Network Access Control: The Company-Wide Team Building Exercise That Only You Know About
No Silver Bullet. Multi contextual threat detection via Machine Learning.
One Compromise to Rule Them All
Opening Keynote Pt. I & II
Operation Escalation: How Commodity Programs Are Evolving Into Advanced Threats
Owning Your Career on a Daily Basis
PAL is your pal: Bootstrapping secrets in Docker
Panel: Progress On Cyber Safety
Passphrases for Humans: A Cultural Approach to Passphrase Wordlist Generation
PeerLyst Meet and Greet
PLC for Home Automation and How It Is as Hackable as a Honeypot
Powershell-Fu – Hunting on the Endpoint
Proactive Password Leak Processing
Pushing Security from the Outside
QUESTIONING 42: Where is the “Engineering” in the Social Engineering of Namespace Compromises?
#recruiterfail vs #candidatefail
Rock Salt: A Method for Securely Storing and Utilizing Password Validation Data
Scalability: Not as Easy as it SIEMs
Security Vulnerabilities, the Current State of Consumer Protection Law, & how IOT Might Change It
Shall We Play A Game? 30 Years of the CFAA
Six Degrees of Domain Admin - Using BloodHound to Automate Active Directory Domain Privilege Escalation Analysis
State Of Automotive Cyber Safety
State Of Healthcare Cyber Safety
Stealing Food From the Cat's Mouth
Stop the Insanity and Improve Humanity: UX for the Win
Survey says… Making progress in the Vulnerability Disclosure Debate
That Which Must Not Be Spoken Of: A Personal Look at Mental Health in Infosec
The Deal with Password Alternatives
The Future of BSides
There is no security without privacy
Toward Better Password Requirements
Uncomfortable Approaches
Uncomfortable Truths
Welcome to The World of Yesterday, Tomorrow!
What Snowden and I Have in Common - Reflections of an ex-NSA Hacker
What's Up Argon2? The Password Hashing Winner A Year Later
What we've learned with Two-Secret Key Derivation
Why Can't We Be Friends?
Why does everyone want to kill my passwords?
Why it's all snake oil - and that may be ok
Why Snowden’s Leaks Were Inevitable
You Don't See Me - Abusing Whitelists to Hide and Run Malware