Star 0

Talks

Title Humans
Five Keys to Building an Application Security Program in the Age of DevOps Veracode
Hacker Jeopardy
Swimming Upstream: Regulation vs Security
Capture The Flag Google Inc. , Synack
#securityselfie (size up your appsec program with new metrics) Facebook
Should I Pay or Should I Go? Game Theory and Ransomware
Queercon Mixer
Spymaster Challenge
Make Alerts Great Again
Spymaster Challenge
Capture The Flag Google Inc. , Synack
Linux Monitoring at Scale with eBPF
Look Ma, No Hands! - Decentralizing security for scale
Sunday Night Party
AtomBombing: Injecting Code Using Windows’ Atoms Tal Liberman , Udi Yavo , enSilo Inc
Weathering the Storm: The Art of Crisis Communications Rapid7
Better SSH management with ephemeral keys
When Bandit(s) Strike - Defend your Python Code Netflix
Building an Effective Intrusion Detection Program
How Secure are your Docker Images? Carnegie Mellon University
Access Control with Concierge: One Tool to Rule Them All
Reducing “Mixtape to Master Key” Scenarios: How to block the Dark Army from mayhem using API-driven access control
Dormant DOMination
Bypassing malware analysis sandboxes is easy, let’s discuss how they are doing it and why it works
Live Dissection: Anatomy of a Browser Based Botnet Ilya Nesterov , Shape Security
How to Build a Security Team and Program
Lockpick Village
Hijacking .NET to Defend PowerShell Amanda Rousseau
DNS attacks, a history and overview
Advanced Internet dataset combinations for #ThreatHunting & Attack Prediction
Exploiting Websites Hands-On Instructor
Assessing the Embedded Devices On Your Network Google Inc.
Fighting Email Phishing with a Custom Cloud IDS Dan Borges
Illusion vs Reality: An FBI Agent’s take on how private sector realities are masked by government sector illusions of intelligence sharing, public-private partnerships and best practices
Opinionless Enforcement of Opinions on Operational Secrets Autodesk
Hacker Happy Hour HackerOne
Tired of Playing Exploit Kit Whack-A-Mole? Let's automate
Securing Kubernetes Jesse Endahl , Fleetsmith
Exploiting Broken Webapps Google Inc.
Security through Visibility: Organizational Communication Strategies for InfoSec Teams
The Underground Economy of Apple ID Palo Alto Networks
The Cyber Insurance Emperor Has No Clothes
Does DoD Level Security Work in the Real World?
Witchcraft Compiler Collection : Towards programs self awareness Jonathan Brossard
Lockpick Village
BeyondCorp: Beyond “fortress” security Google Inc.