Star 0

Talks

Title Humans
Redesigning the Edge with Just-In-Time Network Access Jon DeHart , Microsoft Corporation
How to Avoid Implement An Exploit Friendly JIT
Ransomware Threat Landscape and Retrospect
Win32k Security Improvements: Past & Present
Analysis of the Attack Surface of Microsoft Office from User's Perspective
Detecting Malicious Masquerading Processes John Booth , Microsoft Corporation
Fuzzing Cloud "Project Springfield" David Molnar , Microsoft Corporation
Trusted Things That Execute
Security of Open Source at Microsoft Michael Scovetta , Jan Vandenbos , Microsoft Corporation
Invoke-Obfuscation: Powershell obFUsk8tion Techniques & How To (Try To) D""e'Tec'T 'Th'+'em'
Visiting the Bear Den Jessy Campos , ESET
Breaking Things Early: Designing Secure Containers Saruhan Karademir , Microsoft Corporation
You didnt see it’s coming? "Dawn of hardened Windows Kernel" Peter Hlavaty , Tencent, Inc.
Analysis of the Attack Surface of Microsoft Office from User's Perspective Haifei Li , Intel Security
Breaking Things Early: Designing Secure Containers
Fuzzing Cloud "Project Springfield"
Windows Credential Protections: Where are we now? Michiko Short , Microsoft Corporation
Redesigning the Edge with Just-In-Time Network Access
What is Threat Intelligence? Stirling McBride , Daniel Edwards , Microsoft Corporation
I Got a Letter From the Government the Other Day... Unveiling a Campaign of Intimidation, Kidnapping, and Malware in Kazakhstan Cooper Quintin , Electronic Frontier Foundation
Trusted Things That Execute Casey Smith , Veris Group ATD
In-memory compromise detection as an Azure service Pete Loveless , Fred Aaron , Microsoft Corporation
Gaining Visibility into Linux Binaries on Windows - How to defend and understand WSL
In-memory compromise detection as an Azure service
Windows Credential Protections: Where are we now?
The Security Monty Python and the Holy Grail
Harnessing Intel Processor Trace on Windows for Vulnerability Discovery
Windows Subsystem for Linux (WSL) Stephen Hufnagel , Sven Groot , Microsoft Corporation
Gaining Visibility into Linux Binaries on Windows - How to defend and understand WSL Alex Ionescu , Crowdstrike
Windows Subsystem for Linux (WSL)
I Got a Letter From the Government the Other Day... Unveiling a Campaign of Intimidation, Kidnapping, and Malware in Kazakhstan
Detecting Malicious Masquerading Processes
Visiting the Bear Den
Security of Open Source at Microsoft
A Year of Hardening Adobe Flash Player David Weston , Matt Miller , Peleus Uhley , Microsoft Corporation , Adobe Systems, Inc.
Identity Protection at scale - A Year in the Trenches with Microsoft Identity Protection team
Identity Protection at scale - A Year in the Trenches with Microsoft Identity Protection team Alex Weinert , Dana Kaufman , Microsoft Corporation
Win32k Security Improvements: Past & Present Genghis Karimov , Microsoft Corporation
What is Threat Intelligence?
How to Avoid Implement An Exploit Friendly JIT Yunhai Zhang , NSFOCUS
A Year of Hardening Adobe Flash Player
Hypervisors in Your Toolbox: Monitoring and Controlling System Events with HyperPlatform
Ransomware Threat Landscape and Retrospect Marianne Malle , Patrick Estavillo , Microsoft Corporation
Hypervisors in Your Toolbox: Monitoring and Controlling System Events with HyperPlatform Satoshi Tanda , Crowdstrike
Harnessing Intel Processor Trace on Windows for Vulnerability Discovery Andrea Allievi , Richard Johnson , Microsoft Corporation , Cisco Systems
You didnt see it??s coming? "Dawn of hardened Windows Kernel"
Invoke-Obfuscation: Powershell obFUsk8tion Techniques & How To (Try To) D""e'Tec'T 'Th'+'em' Daniel Bohannon , Mandiant
The Security Monty Python and the Holy Grail David Kennedy , Binary Defense Systems , TrustedSec