Opening Remarks
Detect Me If You Can
Building the Panopticon: Centralized Logging and Alerting With Free Tools
Easily Deploying and Optimizing Open Source Web Application Firewalls
Ducky-in-the-middle: Injecting keystrokes into plaintext protocols
How the Cookie Crumbles: Modern HTTP State Persistence
Learn How to Expect the Unexpected: Unusual & Unexpected Findings in Incident Response
Virtualization Based Security Strengths and Weaknesses
Sentry or: How I Learned to Stop Worrying and Delete My Accounts
Keynote
Turning Domain Data into Domain Intelligence
Rise of the Miners
IoT Devices - And why they desperately need help.
IoT Botnet Detection System using Machine Learning
IoT 4n6: The Growing Impact of the Internet of Things on Digital Forensics
Red and Blue Ping Pong
Civic and Humanitarian Open Source
BinDbg: Easy Windows Debugging for Binary Ninja
Pentesting DevOps: Attacking Containers and Container Orchestration
Open source SAST and DAST tools for web app pen testing
How to "hack" point of sale systems
Lightning Talks
AutoRepeater: Automated HTTP Request Repeating With Burp Suite
Top SIEM Rules You Should Implement Today
Closing Remarks