My Life on the Infosec D-List
|
Andrew Hay
|
Joshua Corman, Jack Daniel, Anton Chuvakin, Andy Ellis, Guest
|
|
Memory Corruption, Exploitation, and You
|
Dino Dai Zovi
|
Unicorns, Clubhouses, and Ruffled Feathers: Women in Security
|
Andrew Hay
|
Preparing for a PCI forensic investigation -
A ex-QIRA speaks out
|
|
Social Penetration
|
|
Security? Who cares!
|
|
Being Inbred Isn't Just a Problem for Hillbillies. Groupthink and the InfoSec Industry
|
|
So You Want to Analyze Malware?
|
|
Your computer is worth 30 cents
|
Gunter Ollmann
|
Playing with Fire – Live Demonstration of Today’s Most Dangerous Malware
|
|
Risk Management - Time to blow it up and start over?
|
|
So What's the Alternative? A group discussion of the security solutions replacing password authentication
|
|
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept Secret)
|
|
Network Time Bandits
|
|
Computing Risk without Numbers: A Semantic Approach to Risk Metrics
|
|