• 12:00
  • Keynote (Tuesday)

    Justine Aitel
    Tue, 12:00 - 12:45
    Ballroom
  • 13:00
  • How to Implement New Security Features and Fix Broken Stuff with Feature Flags and A/B Tests

    Kenneth Lee
    Tue, 13:00 - 13:45
    Washington
  • Setup for Failure: Defeating SecureBoot

    John Butterworth, Sam Cornwell, Xeno Kovah
    Tue, 13:00 - 13:45
    Library
  • Diablo Security: What Can Infosec Learn from Video Games?

    Dwayne Melancon
    Tue, 13:00 - 13:45
    Shubert
  • 14:00
  • Hybrid Analysis Mapping: Making Security and Development Tools Play Nice Together

    Dan Cornell
    Tue, 14:00 - 14:45
    Washington
  • Measuring Security Outcomes: From Data to Insight for Third Party Risk Management

    Stephen Boyer
    Tue, 14:00 - 14:45
    Library
  • Top 50 Non-State Hacker Groups of the World

    Christopher Ahlberg
    Tue, 14:00 - 14:45
    Shubert
  • 15:30
  • Reverse Engineering the Human OS

    Andy Ellis
    Tue, 15:30 - 16:15
    Washington
  • Offensive Defense through Attacker Mimicry

    Stephan Chenette
    Tue, 15:30 - 16:15
    Library
  • Bit, Bit, Coin: What Virtual Money Can Tell Us About Hacking Economic & Social Systems

    Allison Miller
    Tue, 15:30 - 16:15
    Shubert
  • 16:30
  • iOS App Reversing; a Practical Approach

    Patrick Wardle
    Tue, 16:30 - 17:15
    Washington
  • Mackerel: A Progressive School of Cryptographic Thought

    Justin Troutman
    Tue, 16:30 - 17:15
    Library
  • Risk, Audit, and Compliance for Hackers & Defenders

    John Nye
    Tue, 16:30 - 17:15
    Shubert