• 09:00
  • Hacking the Hustle Hands-On, Infosec Resume and Career Strategies

    Eve Adams
    Tue, 09:00 - 09:50
    Common Ground
  • Wireless Essentials (Tue)

     
    Tue, 09:00 - 18:00
    Training Ground
  • 10:00
  • Opening Keynote -- Beyond Good and Evil: Towards Effective Security

    Adam Shostack
    Tue, 10:00 - 10:50
    Common Ground
  • 11:00
  • USB write blocking with USBProxy

    Dominic Spill
    Tue, 11:00 - 11:50
    Breaking Ground
  • SHA-1 backdooring and exploitation

    Jean-Philippe Aumasson
    Tue, 11:00 - 11:35
    Common Ground
  • The Power Law of Information

    Michael Roytman
    Tue, 11:00 - 11:40
    Ground Truth
  • #edsec: Hacking for Education

    Jessy Irwin
    Tue, 11:00 - 11:30
    Proving Ground
  • Skull And Bones (And Warez) - Secret Societies of the Computer Underground (and why you should create one too)

    Databeast, Space Rogue
    Tue, 11:00 - 11:50
    Underground
  • 11:35
  • So, you want to be a pentester?

    Heather Pilkington
    Tue, 11:35 - 12:05
    Proving Ground
  • 11:45
  • Evading code emulation: Writing ridiculously obvious malware that bypasses AV

    Kyle Adams
    Tue, 11:45 - 13:00
    Common Ground
  • 11:50
  • Measuring the IQ of your Threat Intelligence feeds

    Kyle Maxwell, Alex Pinto
    Tue, 11:50 - 12:40
    Ground Truth
  • 12:00
  • Allow myself to encrypt...myself!

    Evan Davison
    Tue, 12:00 - 12:50
    Breaking Ground
  • Custodiet watches your packets! The Open Source MSSP Framework

    Billy Boatright, Joshua Marpet
    Tue, 12:00 - 12:50
    Underground
  • 12:10
  • Securing Sensitive Data: A Strange Game

    Jeff Elliot
    Tue, 12:10 - 12:40
    Proving Ground
  • 14:00
  • What reaction to packet loss reveals about a VPN

    Sergey Bratus, Anna Shubina
    Tue, 14:00 - 14:50
    Breaking Ground
  • Security Management Without the Suck

    Tim Krabec, Tony Turner
    Tue, 14:00 - 14:50
    Common Ground
  • Strategies Without Frontiers

    Meredith L. Patterson
    Tue, 14:00 - 15:20
    Ground Truth
  • Brick in the Wall vs Hole in the Wall

    Caroline D Hardin
    Tue, 14:00 - 14:30
    Proving Ground
  • C.R.E.A.M. – The Art of Social Engineering Report Writing

    Aaron Crawford
    Tue, 14:00 - 18:00
    Training Ground
  • Master Serial Killer

    Chris Sistrunk
    Tue, 14:00 - 14:50
    Underground
  • 14:35
  • Cut the sh**: How to reign in your IDS.

    Tony Robinson
    Tue, 14:35 - 15:05
    Proving Ground
  • 15:00
  • Untwisting the Mersenne Twister: How I killed the PRNG

    moloch, Dan Petro
    Tue, 15:00 - 15:50
    Breaking Ground
  • Vulnerability Assessments on SCADA: How i 'owned' the Power Grid.

    Fadli B. Sidek
    Tue, 15:00 - 15:50
    Common Ground
  • 501(c)(3) for (un)fun and (non)profit

    Jack Daniel
    Tue, 15:00 - 15:50
    Underground
  • 15:10
  • Geek Welfare -- Confessions of a Convention Swag Hoarder

    Rachel Keslensky
    Tue, 15:10 - 15:40
    Proving Ground
  • 15:30
  • ClusterF*ck - Actionable Intelligence from Machine Learning

    David Dorsey, Mike Sconzo
    Tue, 15:30 - 16:10
    Ground Truth
  • 15:45
  • No InfoSec Staff? No Problem.

    Anthony Czarnik
    Tue, 15:45 - 16:15
    Proving Ground
  • 16:00
  • Anatomy of memory scraping, credit card stealing POS malware

    Amol Sarwate
    Tue, 16:00 - 16:50
    Breaking Ground
  • Malware Analysis 101 - N00b to Ninja in 60 Minutes

    grecs
    Tue, 16:00 - 16:50
    Common Ground
  • Protecting Data – How Cultural-Political Heritage Shapes Security Approaches

    Malte Pollmann
    Tue, 16:00 - 16:50
    Underground
  • 16:20
  • Know thy operator

    Misty Blowers
    Tue, 16:20 - 17:00
    Ground Truth
  • Can I Code Against an API to Learn a Product?

    Adrienne Merrick-Tagore
    Tue, 16:20 - 16:50
    Proving Ground
  • 16:55
  • Bridging the Air Gap: Cross Domain Solutions

    Patrick Orzechowski
    Tue, 16:55 - 17:25
    Proving Ground
  • 17:00
  • Cluck Cluck: On Intel's Broken Promises

    Jacob Torrey
    Tue, 17:00 - 17:50
    Breaking Ground
  • Travel Hacking With The Telecom Informer

    TProphet
    Tue, 17:00 - 17:50
    Common Ground
  • FAP Fully Automated Pwning Techniques for Automated Reversing

    Edmond Rogers
    Tue, 17:00 - 17:50
    Underground
  • 17:10
  • Improving security by avoiding traffic and still get what you want in data transfers

    Art Conklin
    Tue, 17:10 - 17:50
    Ground Truth
  • 17:30
  • Back Dooring the Digital Home

    David Lister
    Tue, 17:30 - 18:00
    Proving Ground
  • 18:00
  • The Semantic Age - or - A Young Ontologist's Primer

     
    Tue, 18:00 - 18:50
    Ground Truth