Attacking Modern SaaS Companies
How I Broke Into Your Datacenter
Systematic Network Security Troubleshooting (pcaps or gtfo)
Defeating Application Defenses Through XSS
Get Low (To all STC STC STC STC)
Whose Idea Was That? Comparing Security Curriculums and Accreditations To Industry Needs
Insecure Design Patterns in IoT
How Bad Is My DIY Password Manager?
Keynote
Problems With Elliptic Curves In TLS and SSH
Decoder Improved: An Improved Burp Suite Decoder
Robust Defense For The Rest of Us
The Guild: The Rise and Fall Future of Syracuse’s Hackerspace
Data Breach Response: Why Communication Fails
Common Developer Crypto Mistakes (with illustrations in Java)
Breaking is Bad: Why Everyone at This Conference Will be Unemployed
It’s Time to Innovate for Cyber Defense (How to Out-Hack the Cyber Cracker)
Real Security Incidents, Unusual Situations
Responding to Cyber Attack at Machine Speed
Reverse Engineering Techniques for Game Hacking
Insecure Obsolete and Trivial: The Real IOT
DNS Unbound
Lightning Talks
The Hardest CTF I’ve Ever Done: My Experiences Reverse Engineering an MMORPG
Here We Go Again - A PenTester’s Year in Review
Closing Ceremony