Star 0

Talks

Title Humans
Sedating the Watchdog: Abusing Security Products to Bypass Windows Protections Tomer Bitton
Guest to root - How to Hack Your Own Career Path and Stand Out
Who’s Breaking into Your Garden? iOS and OS X Malware You May or May Not Know Palo Alto Networks
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Information Security Matthew Hathaway , Rapid7
Mobile App Corporate Espionage
Using Behavior to Protect Cloud Servers
Sweet Security: Deploying a Defensive Raspberry Pi Travis Smith , Tripwire
Breaking Honeypots for Fun and Profit Gadi Evron , Cymmetria
Why it’s all snake oil – and that may be ok
Fraud Detection & Real-time Trust Decisions
Employee Hijacking: Building a hacktober awareness program
Everything Is Awful (And You're Not Helping)
TOOOL
Digital Intelligence Gathering: Using the Powers of OSINT for Both Blue and Red Teams
The Tales of a Bug Bounty Hunter Arne Swinnen , NVISO
Fuzz Smarter, Not Harder (An afl-fuzz Primer) Craig Young , Tripwire
APT Reports and OPSEC Evolution, or: These are not the APT reports you are looking for Gadi Evron , Cymmetria
Exploiting Broken Webapps
A year in the wild: fighting malware at the corporate level
IoT on Easy Mode (Reversing Embedded Devices)
In the crosshairs: the trend towards targeted attacks
The Ransomware Threat: Tracking the Digital Footprints OpenDNS
Planning Effective Red Team Exercises FusionX
Sucker-punching Malware: A Case Study in Using Bad Malware Design Against Attackers John Bambenek
Coffee
Scan, Pwn, Next! – exploiting service accounts in Windows networks
Venue Open/Registration
Advanced techniques for real-time detection of polymorphic malware
Securing the Distributed Workforce William Bengtson
Elliptic Curve Cryptography for those who are afraid of mathematics
Why Can't We Have Nice Things? Conflict Resolution in Information Security Leviathan Security Group
Sharing is Caring: Understanding and measuring Threat Intelligence Sharing Effectiveness Alex Pinto , Niddel
Exploit Development Training & Competition Instructor
Keynote: A Declaration of the Independence of Cyberspace
Mainframes? On My Internet?
The Art of the Jedi Mind Trick Tenable Network Security
Developing a Rugged DevOps Approach to Cloud Security
Access Control in 2016 - deep dive
Hackers Hiring Hackers - How to hack the job search and hack talent IrishMASMS