Star 0

Talks

Title Humans
Dangerous Contents - Securing .Net Deserialization
Detecting compromise on Windows endpoints with osquery
Out of The Truman Show: VM escape in VMware gracefully Lei Shi , Mei Wang , Qihoo 360
PIE - An Active Defense PowerShell Framework for Office365 Greg Foss , LogRhythm
KERNELFAULT: R00ting the Unexploitable using Hardware Fault Injection
Raising the Bar: New Hardware Primitives for Exploit Mitigations Rob Turner , Qualcomm Technologies
Tales from the SOC: Real-world Attacks Seen Through Defender ATP Brian Hooper , Jagadeesh , Parameswaran , Microsoft Corporation
All your cloud are belong to us; hunting compromise in Azure Nate Warfield , Ben Ridgway , Microsoft Corporation
Detection is not a classification: reviewing machine learning techniques for cybersecurity specifics Alexander Chistyakov , Kaspersky Lab
28 Registrations Later: Measuring the Exploitation of Residual Trust in Domains
"_____ Is Not a Security Boundary." Things I Have Learned and Things That Have Gotten Better from Researching Microsoft Software Matt Nelson , SpecterOps
Account Compromise 2017: in the Trenches with the Microsoft Identity Security and Protection Team Alex Weinert , Dana Kaufman , Microsoft Corporation
Out of The Truman Show: VM escape in VMware gracefully
Baby??s First Bounty: Lessons from bypassing Arbitrary Code Guard
Dyre to Trickbot: An inside look at TLS-encrypted command-and-control traffic Andrew Brandt , Symantec
A Lustrum of Malware Network Communication: Evolution and Insights Chaz Lever , Georgia Institute of Technology
Securing Windows Defender Application Guard Saruhan Karademir , David Weston , Microsoft Corporation
All your cloud are belong to us; hunting compromise in Azure
WannaCrypt + SMBv1.0 vulnerability = One of the most damaging ransomware attacks in history
Securing Windows Defender Application Guard
Tales from the SOC: Real-world Attacks Seen Through Defender ATP
Detecting compromise on Windows endpoints with osquery Nick Anderson , Facebook
10 Years of Targeted Credential Phishing
Born secure. How to design a brand new cloud platform with a strong security posture
Detection is not a classification: reviewing machine learning techniques for cybersecurity specifics
Account Compromise 2017: in the Trenches with the Microsoft Identity Security and Protection Team
Don't let your virtualization fabric become the attack vector
Baby’s First Bounty: Lessons from bypassing Arbitrary Code Guard Alex Ionescu , Crowdstrike
Mitigations for the Masses: From EMET to Windows Defender Exploit Guard Mark Wodrich , Jasika Bawa , Microsoft Corporation
Keynote Merike Kaeo , Farsight Security
TLS 1.3 - Full speed ahead... mind the warnings - the great, the good and the bad Joseph Salowey , Tableau Software
28 Registrations Later: Measuring the Exploitation of Residual Trust in Domains Yacin Nadji , Georgia Institute of Technology
Active Directory Security: The Journey
Using TLS Certificates to Track Activity Groups
Corrupting Memory in Microsoft Office Protected-View Sandbox Yong Chuan Koh , MWR InfoSecurity
Mitigations for the Masses: From EMET to Windows Defender Exploit Guard
Down the Open Source Software Rabbit Hole Kymberlee Price , Sam Vaughan , Microsoft Corporation
??_____ Is Not a Security Boundary." Things I Have Learned and Things That Have Gotten Better from Researching Microsoft Software
Where, how, and why is SSL traffic on mobile getting intercepted? A look at three million real-world SSL incidents Alban Diquet , Thomas Sileo , Data Theorem
Raising the Bar: New Hardware Primitives for Exploit Mitigations
Born secure. How to design a brand new cloud platform with a strong security posture Filippo Seracini , Lee Holmes , Microsoft Corporation
Extracting Secrets from Silicon - A New Generation of Bug Hunting Gunter Ollmann , Microsoft Corporation
Extracting Secrets from Silicon - A New Generation of Bug Hunting
Betraying the BIOS: Where the Guardians of the BIOS are Failing Alex Matrosov , Cylance
KERNELFAULT: R00ting the Unexploitable using Hardware Fault Injection Alex Matrosov , Cristofaro Mune , Riscure B.V.
WannaCrypt + SMBv1.0 vulnerability = One of the most damaging ransomware attacks in history Andrea Lelli , Microsoft Corporation
Using TLS Certificates to Track Activity Groups Mark Parsons , Microsoft Corporation
PIE - An Active Defense PowerShell Framework for Office365
Don't let your virtualization fabric become the attack vector Dean Wells , Microsoft Corporation
Sednit Reloaded: The Bears' Operations From Christmas to Halloween Alexis Dorais-Joncas , Thomas Dupuy , ESET
Leveraging Honeypots to Train a Supervised Model for Brute-Force Detection
Scaling Incident Response - 5 keys to successful defense at scale
Keynote
10 Years of Targeted Credential Phishing Billy Leonard , Google Inc.
You Are Making Application Whitelisting Difficult
Disrupting the Mirai Botnet
Leveraging Honeypots to Train a Supervised Model for Brute-Force Detection Mathias Scherman , Daniel Edwards , Tomer Koren , Microsoft Corporation
Go Hunt: An automated approach for security alert validation Oran Brill , Tomer Teller , Microsoft Corporation
You Are Making Application Whitelisting Difficult Casey Smith , Red Canary
A Lustrum of Malware Network Communication: Evolution and Insights
Go Hunt: An automated approach for security alert validation
Down the Open Source Software Rabbit Hole
Dyre to Trickbot: An inside look at TLS-encrypted command-and-control traffic
TLS 1.3 - Full speed ahead... mind the warnings - the great, the good and the bad
Corrupting Memory in Microsoft Office Protected-View Sandbox
Betraying the BIOS: Where the Guardians of the BIOS are Failing
Scaling Incident Response - 5 keys to successful defense at scale Matt Swann , Microsoft Corporation
Active Directory Security: The Journey Sean Metcalf , Trimarc
Where, how, and why is SSL traffic on mobile getting intercepted? A look at three million real-world SSL incidents
Disrupting the Mirai Botnet Chuck McAuley , Ixia Communications
Sednit Reloaded: The Bears' Operations From Christmas to Halloween
Dangerous Contents - Securing .Net Deserialization Jonathan Birch , Microsoft Corporation