Deep Learning for Realtime Malware Detection
This Is Not Your Grandfather’s SIEM
Embedded Device Vulnerability Analysis Case Study Using TROMMEL
Securing Bare Metal Hardware at Scale
CITL — Quantitative, Comparable Software Risk Reporting
0wn the Con
Getting Cozy with OpenBSM Auditing on MacOS … The Good, the Bad, & the Ugly
Do as I Say, Not as I Do: Hacker Self Improvement and You
SIGINT on a budget: Listening in, gathering data and watching–for less than $100
ShmooCon Debates
Closing Remarks