Welcome (Thursday)
TASBot
Intercepting, modifying, and generating wireless signals with SDR
Practical optical key-duplication attacks via superresolution sensing
Pissing off the bad guys by porting grsecurity to HardenedBSD
Cryptography Pitfalls
IOT web of intrigue
Hacking your local government
TCP Exploits
SQL Server Hacking on Scale using PowerShell
Ph'ing Phishers
Borders for Dummies
Bears...Bears Everywhere
Cryptocurrencies: You keep using that word, anonymity. I do not think it means what you think it means.
Why and How to Teach People _Cyber_ Isn't A Thing
Red Teaming Insights and Examples From Beyond the Infosec Community
How I Darkweb Economies (and You Can Too!)
Wearable Security - Perspectives on Attack and Defense
Transitioning to AWS in a Hurry Without Getting Owned
TBA
It Came from the Garbage!
The Mirai BotNet and where DDoS attacks are headed