Industrial Control System Network Analysis
Hands-on OSINT Crash Course for Hackers
Intro to Practical Network Signature Development for Open Source IDS
Something Wicked: Defensible Social Architecture in the context of Big Data, Behavioral Econ, Bot Hives, and Bad Actors
How To Lose Friends and Influence People (An Apology)
GO Forth And Reverse
Destructive Malware and Interstate Rivalries: The Evolution of Digital Weapons and Geopolitical Conflict
Hidden Hot Battle Lessons of Cold War: All Learning Models Have Flaws, Some Have Casualties
Optimizations for Bitcoin key cracking
How To Accidentally Get A Job In InfoSec.
IATC Kickoff
A Day in the Life of a Product Security Incident Response Manager
Banking on Insecurity: The ongoing fairytale of securing financial institutions
Deep Learning Neural Networks – Our Fun Attempt At Building One
What A Career In Public Service Is Really About
From SOC to CSIRT
Mentoring, Networking, Resume Review
Koadic C3 - Windows COM Command & Control Framework
Google Apps Scripts Kill Chain
Your model isn't that special: zero to malware model in Not Much Code and where the real work lies
Measuring the Use and Abuse of Brain Wallets
Public Policy of Things
How to escalate privileges to administrator in latest Windows.
Extreme Mobile Application Exploitation
Elastic-ing All the Things - Saving anything at elastic stack and having fun with detections
Navigating the Alternative Facts of Malware Prevention
IMSI Catchers And The Happy Yellow Helicopter: Security Challenges At Standing Rock
Getting insight out of and back into deep neural networks
Rate the Recruiter
Two-Factor Auth - Demand Bidirectional
The Black Art of Wireless Post-Exploitation: Bypassing Port-Based Access Controls Using Indirect Wireless Pivots
Hadoop Safari : Hunting For Vulnerabilities
Sex, Secret and God: A Brief History of Bad Passwords
The Commoditization of Security Solutions: Will You Be Replaced by a Small Script?
Feds <3 H4ckers
Pwn All The Mobile Porn Apps
Inside MormonLeaks: the why, the how, and the what
Transfer Learning: Analyst-Sourcing Behavioral Classification
Breaking the Fourth Wall - Hacking a 50 years old myth
Microservices And FaaS For Offensive Security
All The Sales President’s Men
The Human Factor: Why Are We So Bad at Security and Risk Assessment?
Think Complex Passwords Will Save You?
Healthcare in Critical Condition
I Club and So Can You
Ask the EFF
Zero Trust Networks: In Theory and in Practice
How To Hack Recruiting: Turning the Tables (Panel)
Engineering My Way Into InfoSec
The Struggle Is Real: My Journey With Mental Health Issues
Behavioral Analysis from DNS and Network Traffic
Cash in the aisles: How gift cards are easily exploited
Recruiter Smack Down (Panel)
HHS Task Force (Panel)
Introduction to Reversing and Pwning
Skip tracing for fun and profit
SniffAir – An Open-Source Framework for Wireless Security Assessments
Regulatory Nets vs. The Fishing Hook Of Litigation
Internet of Cars
Writing Malware Without Writing Code
Pwning Software-Defined Networking (SDN)
Sympathy for the Developer
Going Passwordless
The Attack Chain Of A Nation-State (Equation Group)
YARA-as-a-Service (YaaS): Real-Time Serverless Malware Detection
Hacking the Law: A Call for Action – Bug Bounties Legal Terms as a Case Study