Introduction to Cryptographic Attacks
Mobile Application Hacking - Master Class
Intro to Industrial Control System Network Analysis
Windows Internals and Local Attack Surface Analysis using Powershell
Network Security Monitoring
Cold Case Cyber Investigations: Catfishing Cooper and Other Ops
The Best of Security BSides Now and Then: Ten Years of Mixes
Hillbilly Storytime - Pentest Fails
Keynote Q&A; and Meet & Greet with Jim Christy
ATT&CKing; the Status Quo: Improving Threat Intel and Cyber Defense with MITRE ATT&CK;
Who Wants to Be A Regulator: The IoT Security Game Show
The Chrome Crusader
TBD
Get on the Eye Level: Tailoring the Security Talk
101 ways to fail at getting value out of your investments in security analytics, and how not to do that
Lesley Carhart Kicks Off Hire Ground
Intro Session
From Hacker to Serial Entreprenuer
Resume Review & Career Coaching
SiliVaccine: North Korea's Weapon of Mass Detection
How to Start a Cyber War: Lessons from Brussels -EU Cyber Warfare Exercises
Active Directory Password Blacklisting
Who Watches the Watchers?: Understanding the Internet's Background Noise
An Introduction to Machine Learning and Deep Learning
Engaging the Media: Know Your Target
Social engineering at scale, for fun
Deep Dive into NMAP & Network Scanning
Snake Oil & The Security Industry
You're Good and You Should Feel Good
Implementing the Three Cs of Courtesy, Clarity, and Comprehension to Optimize End User Engagement
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else
Red Teaming a Manufacturing Network (Without Crashing It)
Anatomy of NTLMv1/NTLMv1-SSP
Lessons Learned by the WordPress Security Team
Stop and Step Away from the Data: Rapid Anomaly Detection via Ransom Note File Classification
The Long Way Around – from Software Engineering to Cyber Security (How Choosing Wrong Turned out to be Right)
Engaging the Media: Telling Your Story
Building A Teaching / Improvement Focused SOC
A peek into the cyber security of the aviation Industry.
Modern Political Warfare: A Look at Strategy and TTPs
Attacking Ethereum dApps
An Encyclopedia of Wiretaps
Fighting Fraud in the Trenches
Sight beyond sight: Detecting phishing with computer vision.
A Good Day to Die? IoT End of Life
Legendary Defender - The Voltron Analogy
That Buzzword Bingo Rapid Debates Panel Thing
Redefining the Hacker
Not your Grandpa's Password Policy
Serverless Infections: Malware Just Found a New Home
You're just complaining because you're guilty: A Guide for Citizens and Hackers to Adversarial Testing of Software Used In the Criminal Justice System
The Effect of Constraints on the Number of Viable Permutations of Passwords
Catch me, Yes we can! -Pwning Social Engineers using Natural Language Processing Techniques in real-time
What Did We Learn from Today? (Recruiter Panel)
Cyber Safety Disclosure
Vulnerability Management 101: Practical Experience and Recommendations
What is Agile and how can I use it well?