• 10:00
  • Running a CTF: Panel and Discussion on the Art of Hacker Gaming

    Branson Matheson, Tyler Nighswander, Liam Randall, Brett Thorson, Jordan Wiens
    Sat, 10:00 - 10:50
    Regency A - Build It!
  • C10M – Defending the Internet At Scale

    Rob Graham
    Sat, 10:00 - 10:50
    Regency B/C/D - Belay It!
  • Paparazzi Over IP

    Daniel Mende, Pascal Turbing
    Sat, 10:00 - 10:50
    Columbia A/B - Bring It On!
  • Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration

    Xeno Kovah
    Sat, 10:00 - 11:20
    Congressional C - Train the Trainer
  • Introduction to Vulnerability Assessment

    Nate Adams, Jose Cintron, Chriss Koch
    Sat, 10:00 - 11:50
    Congressional D - Train the Trainer
  • 11:00
  • DIY: Using Trust To Secure Embedded Projects

    David Anthony, Ted Reed
    Sat, 11:00 - 11:50
    Regency A - Build It!
  • Moloch: A New And Free Way To Index Your Packet Capture Repository

    Eoin Miller, Andy Wick
    Sat, 11:00 - 11:50
    Regency B/C/D - Belay It!
  • Openstack Security Brief

    Matt Joyce
    Sat, 11:00 - 11:50
    Columbia A/B - Bring It On!
  • 11:30
  • Intermediate Intel x86: Architecture, Assembly, Applications, & Alliteration

    Xeno Kovah
    Sat, 11:30 - 12:50
    Congressional C - Train the Trainer
  • 12:00
  • Generalized Single Packet Authorization For Cloud Computing Environments

    Michael Rash
    Sat, 12:00 - 12:50
    Regency A - Build It!
  • From "Shotgun Parsers" to Better Software Stacks

    Sergey Bratus, Meredith L. Patterson
    Sat, 12:00 - 12:50
    Regency B/C/D - Belay It!
  • The Computer Fraud and Abuse Act: Swartz, Auernheimer, and Beyond

    Marcia Hofmann, Orin Kerr
    Sat, 12:00 - 12:50
    Columbia A/B - Bring It On!
  • Android Forensics and Security Testing

    Shawn Valle
    Sat, 12:00 - 13:50
    Congressional D - Train the Trainer
  • 14:00
  • Malware Analysis: Collaboration, Automation & Training

    Richard Harman
    Sat, 14:00 - 14:50
    Regency A - Build It!
  • Bright Shiny Things = Why We Need Intelligent Data Access Controls

    Bob Bigman, David Ferraiolo, Mark McGovern, Craig Rosen
    Sat, 14:00 - 14:50
    Regency B/C/D - Belay It!
  • Ten Strategies of a World-Class Computer Security Incident Response Team

    Carson Zimmerman
    Sat, 14:00 - 14:50
    Columbia A/B - Bring It On!
  • 15:00
  • Armor For Your Android Apps

    Roman Faynberg
    Sat, 15:00 - 15:50
    Regency A - Build It!
  • Protecting Sensitive Information on iOS Devices

    David Schuetz
    Sat, 15:00 - 15:50
    Regency B/C/D - Belay It!
  • Beyond Nymwars: An Analysis Of The Online Identity Battleground

    Aestetix
    Sat, 15:00 - 15:50
    Columbia A/B - Bring It On!
  • The Life of Binaries

    Xeno Kovah
    Sat, 15:00 - 16:20
    Congressional C - Train the Trainer
  • Introduction to Trusted Computing

    Ariel Segall
    Sat, 15:00 - 16:50
    Congressional D - Train the Trainer
  • 16:00
  • How Smart Is Bluetooth Smart?

    Mike Ryan
    Sat, 16:00 - 16:50
    Regency A - Build It!
  • Chopshop: Busting The Gh0St

    Murad Khan, Wesley Shields
    Sat, 16:00 - 16:50
    Regency B/C/D - Belay It!
  • The Cloud - Storms On The Horizon

    Tyler Pitchford
    Sat, 16:00 - 16:50
    Columbia A/B - Bring It On!
  • 16:30
  • Rootkits: What They Are, and How to Find Them

    Xeno Kovah
    Sat, 16:30 - 17:50
    Congressional C - Train the Trainer
  • 17:00
  • 0wn The Con

    Bruce Potter, Heidi Potter
    Sat, 17:00 - 17:50
    Regency A - Build It!
  • PunkSPIDER: An Open Source, Scalable Distributed Fuzzing Project Targeting The Entire Internet

    Alejandro Caceres
    Sat, 17:00 - 17:50
    Regency B/C/D - Belay It!
  • Crypto: You're Doing It Wrong

    Ron Bowes
    Sat, 17:00 - 17:50
    Columbia A/B - Bring It On!
  • Introduction to Software Exploits

    Corey Kallenberg
    Sat, 17:00 - 18:20
    Congressional D - Train the Trainer
  • 18:00
  • Introduction to Software Reverse Engineering

    Frank Poz
    Sat, 18:00 - 18:50
    Congressional C - Train the Trainer
  • 18:30
  • Exploits 2: Exploitation in the Windows Environment

    Corey Kallenberg
    Sat, 18:30 - 19:50
    Congressional D - Train the Trainer
  • 18:35
  • Drones: Augmenting your cyber attack tool bag with aerial weapon systems

    Zac Hinkel
    Sat, 18:35 - 18:50
    Regency A - Fire Talks
  • 18:55
  • Managed Service Providers: Pwn One and Done

    Damian Profanick
    Sat, 18:55 - 19:10
    Regency A - Fire Talks
  • 19:00
  • Reverse Engineering Malware

    Frank Poz
    Sat, 19:00 - 19:50
    Congressional C - Train the Trainer
  • 19:15
  • No Tools? No Problem! Building a PowerShell Botnet

    Christopher Campbell
    Sat, 19:15 - 19:30
    Regency A - Fire Talks
  • 19:35
  • Extending the 20 Critical Security Controls to Gap Assessments and Security Maturity Modelling

    John Willis
    Sat, 19:35 - 19:50
    Regency A - Fire Talks
  • 19:55
  • Protecting Big Data From Cyber APT in the Cloud

    Bill Gardener
    Sat, 19:55 - 20:10
    Regency A - Fire Talks
  • 20:15
  • Writing a Thumbdrive for Active Disk Antiforensics

    Travis Goodspeed
    Sat, 20:15 - 20:30
    Regency A - Fire Talks