TBA
|
Billy Rios
,
Chris Palmer
|
Letting Someone Else's Phone Ring at 3 am: Building Robust Incident Management Frameworks
|
|
Post Attack: Working with Law Enforcement
|
|
Threat Modeling: Learn to Optimize Your
Security Budget
|
|
Active Exploitation Detection
|
|
Security Domination via Hard Drive Isolation
|
|
Bringing Home the Love: Tips, Tricks and Quips on how to Organize a B-Sides Event in Your Town
|
|
Selling Security Without Selling Your Soul
|
|
Screw the TSA: I’ll Be Where I Want, and Get
Credit for It!
|
|
When CSOs Attack
|
|
Security, Supply Chains, and You
|
|
How to Attack Windows Kernel
|
|
Dr. Stuxlove or: How I Learned to Stop Worrying
and Love the Worm
|
Davi Ottenheimer
|
You Are Alone. Enjoy It.
|
|
Something Fun About Using SIEM and Not Failing
or Only Failing Non-Miserably or Not-Too-Miserably
|
|
Gone in 60 Keystrokes
|
|
A Brief History of Hacking
|
Andrew Hay
|
Cloud Security Realities
|
David Mortman
|
Log Analysis and Visualization in the Cloud
|
Raffael Marty
|
Lessons Learned From Running a Bug Bounty Program
|
|
Open Security Intelligence: Art of the Possible or Science of the Necessary?
|
|
Attacking Cyber Security Marketecture
|
Andrew Hay
|
Stop Complaining and Solve a Security
Problem Instead!
|
|
Homo Developomicus - Developers are Human too
|
|
Being Sneaky About Security and Regulations
OR Misdirection: The Rise and Fall and Rise of
Regulatory Compliance
|
|
State of the Scape: The Modern Threat landscape and
Our Ability to React Intelligently
|
|
Reverse Engineering Using the Android Emulator
|
|