Opening Ceremony
Keynote
Thinking Purple
Internet of Things, Voice Control, AI, and Office Automation: BUILDING YOUR VERY OWN J.A.R.V.I.S.
Metasploit Townhall
Data Obfuscation: How to hide data and payloads to make them "not exist" (in a mathematically optimal way)
Go with the Flow: Get Started with Flow Analysis Quickly and Cheaply
Abusing RTF: Evasion, Exploitation and Counter Measures
Writing malware while the blue team is staring at you
Mind Reading for Fun and Profit using DISC
Stagefright: An Android Exploitation Case Study
Top 10 2015-2016 compromise patterns observed & how to use non-traditional Internet datasets to detect & avoid them
Information Security Proposed Solutions Series - 1. Talent
DNSSUX: Why DNSSEC Makes Us Weaker
Macs Get Sick Too
Hunting for Exploit Kits
Rotten Potato - Privilege Escalation from Service Accounts to SYSTEM
+1,000,000 -0: Cloning a Game Using Game Hacking and Terabytes of Data
Nose Breathing 101: A Guide to Infosec Interviewing
Android Patchwork: Convincing Apps to Do What You Want Them To
A Year in the Empire
Next Gen Web Pen Testing: Handling modern applications in a penetration test
DevOops Redux
To Catch a Penetration Tester: Top SIEM Use Cases
Is that a penguin in my Windows?
Real World Attacks VS Check-box Security
PowerShell Secrets and Tactics
Beyond The 'Cript: Practical iOS Reverse Engineering
.... and bad mistakes I've made a few.....
No Easy Breach: Challenges and Lessons from an Epic Investigation
ARRR Maties! A map to the legal hack-back
Project MVP - Hacking and Protecting SharePoint
CrackMapExec - Owning Active Directory by using Active Directory
Adaptation of the Security Sub-Culture
Better Network Defense Through Threat Injection and Hunting
Hacking Lync (or, 'The Weakest Lync')
Responder for Purple Teams
Metaprogramming in Ruby and doing it wrong.
Exploiting First Hop Protocols to Own the Network
Outlook and Exchange for the Bad Guys
It’s Never So Bad That It Can’t Get Worse
AWShit. Pay-as-you-go Mobile Penetration Testing
Evolving your Office's Security Culture
Confronting Obesity in Infosec
Defeating The Latest Advances in Script Obfuscation
From Commodity to Advanced (APT) malware, are automated malware analysis sandboxes as useful as your own basic manual analysis?
BurpSmartBuster - A smart way to find hidden treasures
Advanced Persistent Thirst (APT)