Practical Malware Analysis - Hands-On
Effective YARA
Crams and Exams for Hams
CheckPlease - Payload-Agnostic Implant Security
Purple Team: How This Color Can Help You And Your Organisation Learn and Get Better
The New Cat and Mouse Game: Attacking and Defending Machine Learning Based Software
Safer Storage and Handling of User Answers to Security Questions
Hacking Is Easy, Hiring Is Hard: Managing Security People
Scamming the Scammers - Becoming the Robin Hood of the phones
Why is China all up in my SQL server?
Mining Software Vulns in SCCM / NIST’s NVD– The Rocky Road to Data Nirvana
Technical Tactics: Embedded Linux Software BOM
Applied OSINT: Enabling Better Social Engineering for Better Pen Tests
Technical Tactics: Fear & loathing in building management systems
Network Forensic Analysis in an Encrypted World
Baby Got Hack Back
Building a Benign Data Set
TMTO...Y?
Hacking Tech Interviews
Lightning Talks: Thinking Different
One OSINT Tool to Rule Them All
Accessibility: A Creative Solution to Living Life Blind
A System Dynamics Approach to CNO Modelling
(In)Outsider Trading - Hacking stocks using public information and influence.
Abusing Webhooks for Command and Control
The Role of Data Visualization in Improving Machine Learning Models
Rethinking P@ssw0rd Strength Beyond Brute-force Entropy
Red/Blue Q&A: Pressure Test Lightning Talk Ideas
Your Facts Are Not Safe with Us: Russian Information Operations as Social Engineering
Kick up the Jams
SECSMASH: Using Security Products to own the Enterprise'
Minimum Viable Risk Management Program
Data visualization in security: Still home of the WOPR?
Protecting Windows Credentials: An Excessive Guide for Security Professionals
Hacking College, a Cybersecurity Career, and Certifications
IATC Cyber Crisis Simulation
Robust Defense for the rest of Us
Auditing Of IoT Devices
Advanced Wireless Attacks Against Enterprise Networks
Poking bears: Validating the truth from IoCs in attack postmortem reports
Exploration of Novel Visualizations for Information Security Data
It’s Not Me, It’s You: How To Be A Better Hiring Manager or Rooting Out Excellent Candidates Despite Themselves
I got more games than Milton Bradley: Incentivize a positive change in your security culture
Modern Internet-Scale Network Reconnaissance
DefCon DarkNet Badge Hardware And Software: An Introduction To Custom Badge Building
Magical Thinking... and how to thwart it.
Password Cracking 201: Beyond the Basics
Interrogation Techniques for Fun and Profit: Designing better tools for your SOC team
(Even More) Mainframes? On my Internet?
Is Data Visualization still necessary?
Messing with Forensic Analysts: Modifying VSS Snapshots
Vaccination - An Anti-Honeypot Approach
Hacks and Crafts: Improvised Physical Security Tools for Improvised Situations
Grappling Hooks on the Ivory Tower: This Year in Practical Academic Research
Automating Crypto Bugs Discovery
Hacking Office Politics for Cybersecurity Leaders
IATC Mock Congressional Hearing
Why can't we be friends? (Ask a Fed.)
How To Obtain 100 Facebooks Accounts Per Day Through Internet Searches
Lessons from the front lines: New York City Cyber Command
How To Respond To Cops Who Want Your Passwords
How to make metrics and influence people
F! Passwords!
CTF all the things: Leveraging gamification to up your security game
/.git/ing All Your Data
Everything is Not Awesome: How to Overcome Barriers to Proper Network Segmentation
How I Scanned The Internet For NSA Compromised Firewalls
IATC Closing
Radio frequencies all around us! What data are you leaking and what is done with it?