Star 0

Talks

Title Humans
TBA Billy Rios , Chris Palmer
Letting Someone Else's Phone Ring at 3 am: Building Robust Incident Management Frameworks
Post Attack: Working with Law Enforcement
Threat Modeling: Learn to Optimize Your Security Budget
Active Exploitation Detection
Security Domination via Hard Drive Isolation
Bringing Home the Love: Tips, Tricks and Quips on how to Organize a B-Sides Event in Your Town
Selling Security Without Selling Your Soul
Screw the TSA: I’ll Be Where I Want, and Get Credit for It!
When CSOs Attack
Security, Supply Chains, and You
How to Attack Windows Kernel
Dr. Stuxlove or: How I Learned to Stop Worrying and Love the Worm Davi Ottenheimer
You Are Alone. Enjoy It.
Something Fun About Using SIEM and Not Failing or Only Failing Non-Miserably or Not-Too-Miserably
Gone in 60 Keystrokes
A Brief History of Hacking Andrew Hay
Cloud Security Realities David Mortman
Log Analysis and Visualization in the Cloud Raffael Marty
Lessons Learned From Running a Bug Bounty Program
Open Security Intelligence: Art of the Possible or Science of the Necessary?
Attacking Cyber Security Marketecture Andrew Hay
Stop Complaining and Solve a Security Problem Instead!
Homo Developomicus - Developers are Human too
Being Sneaky About Security and Regulations OR Misdirection: The Rise and Fall and Rise of Regulatory Compliance
State of the Scape: The Modern Threat landscape and Our Ability to React Intelligently
Reverse Engineering Using the Android Emulator