Sedating the Watchdog: Abusing Security Products to Bypass Windows Protections
|
Tomer Bitton
|
Guest to root - How to Hack Your Own Career Path and Stand Out
|
|
Who’s Breaking into Your Garden? iOS and OS X Malware You May or May Not Know
|
Palo Alto Networks
|
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Information Security
|
Matthew Hathaway
,
Rapid7
|
Mobile App Corporate Espionage
|
|
Using Behavior to Protect Cloud Servers
|
|
Sweet Security: Deploying a Defensive Raspberry Pi
|
Travis Smith
,
Tripwire
|
Breaking Honeypots for Fun and Profit
|
Gadi Evron
,
Cymmetria
|
Why it’s all snake oil – and that may be ok
|
|
Fraud Detection & Real-time Trust Decisions
|
|
Employee Hijacking: Building a hacktober awareness program
|
|
Everything Is Awful (And You're Not Helping)
|
|
TOOOL
|
|
Digital Intelligence Gathering: Using the Powers of OSINT for Both Blue and Red Teams
|
|
The Tales of a Bug Bounty Hunter
|
Arne Swinnen
,
NVISO
|
Fuzz Smarter, Not Harder (An afl-fuzz Primer)
|
Craig Young
,
Tripwire
|
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for
|
Gadi Evron
,
Cymmetria
|
Exploiting Broken Webapps
|
|
A year in the wild: fighting malware at the corporate level
|
|
IoT on Easy Mode (Reversing Embedded Devices)
|
|
In the crosshairs: the trend towards targeted attacks
|
|
The Ransomware Threat: Tracking the Digital Footprints
|
OpenDNS
|
Planning Effective Red Team Exercises
|
FusionX
|
Sucker-punching Malware: A Case Study in Using Bad Malware Design Against Attackers
|
John Bambenek
|
Coffee
|
|
Scan, Pwn, Next! – exploiting service accounts in Windows networks
|
|
Venue Open/Registration
|
|
Advanced techniques for real-time detection of polymorphic malware
|
|
Securing the Distributed Workforce
|
William Bengtson
|
Elliptic Curve Cryptography for those who are afraid of mathematics
|
|
Why Can't We Have Nice Things? Conflict Resolution in Information Security
|
Leviathan Security Group
|
Sharing is Caring: Understanding and measuring Threat Intelligence Sharing Effectiveness
|
Alex Pinto
,
Niddel
|
Exploit Development Training & Competition
|
Instructor
|
Keynote: A Declaration of the Independence of Cyberspace
|
|
Mainframes? On My Internet?
|
|
The Art of the Jedi Mind Trick
|
Tenable Network Security
|
Developing a Rugged DevOps Approach to Cloud Security
|
|
Access Control in 2016 - deep dive
|
|
Hackers Hiring Hackers - How to hack the job search and hack talent
|
IrishMASMS
|