Adversary in Depth: Threat Actor TA530
Breaking into Information Security Workshop
Burning Down the Haystack: Efficiency Gained with Security Automation & Orchestration
Classic CTF
Closing: Community Round Table Discussion
Closing Keynote - Social Engineering the News
Cryptography Pitfalls
Cyber Security Analysis Training (Saturday)
Cyber Security Analysis Training (Sunday)
Email is the #1 way we get pwnd
Hackers Interrupted
How to Dystopia Proof your Data
Incident Response 101
IoT Pentesting Workshop
JavaScrypto: How we are using browsers as cryptographic engines
Kill all the Orcs, Hack all the things
Know the adversary: Infiltrating Command and Control Comm’s
Malware Forensics in Minutes
Murder mystery, How Vulnerable Intelligence is Poising your infosec program
Need for Speed, Benefits of speed driven incident response
Neuro Hacking
Opening Keynote - Bringing the Body's Electrical Signals Out of the Body and Designing Interfaces Therein
Out of the Browser into the Fire
Red Team Yourself
Remembering how we got here Integrating defense-in-depth into DevOps Culture
SDR 101 (Saturday)
SDR 101 (Sunday)
Security in the land of Microservices
Threat Hunting for Enterprise
Threat hunting with Scored network features