Greeting
Keynote: Cyber Security in the Age of Espionage
Honeypots and Live Threat Intelligence
Private matters
Incident Response - No Pain No Gain
Redefining Security in a Cloud-Centric Future
De Falsis Deis: Social Contracts
Finding Buried Treasure: The Pirate’s Guide to Job Search
Build Your Own Physical Pentesting Go-Bag
Lessons from the Field: Governance, Compliance & Security in SharePoint Online
Pow Pow Pow Powershell!
Propel Your Security Career by Writing Your Own Story
Securing The Electrical Grid From Modern Threats
Build the capability to Detect, Triage And Respond
Pirate Booty: Navigating the High Seas to Find Your Career Treasure
NFC Your Smartphone's Best Friend or Worst Nightmare
Managing Your MSSP
Advanced Targeted Attack.
Securing Agile Development
What the Hell is ICS Security?
e-Extortion Trends and Defense
HIPAA for Infosec Professionals
Phishing Pholks Phor Phun and Prophit
Weaponizing Splunk: Using Blue Team Tools for Evil
Chaining the Future: Blockchains and Security
Protecting Third-Party Risk From Plundering
ArchStrike Linux
Alert All the Things! (Network Baselines/Alerts with Bro Scripts)
Office 365 Security Center Planning Considerations
Interactive Incident Response
Protecting Visual Assets: Digital Image Counter-Surveillance Strategies
The Pirate’s Map: How Not to Bury Treasure in Your Resume
Deconstructing 100% JavaScript-based Ransomware
Hacking The Sabbath
Intro to Fuzzing for Fun and Profit
Mozilla's tips on strong HTTPS
Resume Review
What I've Learned Writing CTF Challenges
Closing
How Cybercrime Became Big Business