• 11:00
  • Extrapolating from Billions of Access Security Events

    Michael Hanley, Jon Oberheide
    Fri, 11:00 - 11:50
    Main Room - Keynotes
  • 11:30
  • Cyber Vulnerabilities of America's Pipe Lines

    Paul J. Vann
    Fri, 11:30 - 11:55
    Turbo Room - Track 2
  • 12:00
  • Knox: Dealing with Secrets at Scale

    Devin Lundberg
    Fri, 12:00 - 12:50
    Main Room - Track 1
  • Corporate Espionage Without the Hassle of Committing Felonies

    John Bambenek
    Fri, 12:00 - 12:25
    Turbo Room - Track 2
  • 12:30
  • Cybersecurity Research: Pushing the Boundaries

    Anita Nikolich
    Fri, 12:30 - 12:55
    Turbo Room - Track 2
  • 13:00
  • Real solutions from real incidents: save money and your job!

    Jordan Rogers, Guillaume K. Ross
    Fri, 13:00 - 13:50
    Main Room - Track 1
  • Deploying a Shadow Threat Intel Capability: Understanding YOUR Adversaries without Expensive Security Tools

    grecs
    Fri, 13:00 - 13:25
    Turbo Room - Track 2
  • 13:30
  • Abusing Linux Trust Relationships: Authentication Back Alleys and Forgotten Features

    Ronnie Flathers
    Fri, 13:30 - 13:55
    Turbo Room - Track 2
  • 14:00
  • The Complete ESP8266 Psionics Handbook

    Joel Sandin
    Fri, 14:00 - 14:50
    Main Room - Track 1
  • A Major New Trend in the Enterprise is Whitelisted Proxies

    Matt Dyas, Parker Schmitt, John Valin
    Fri, 14:00 - 14:25
    Turbo Room - Track 2
  • 14:30
  • Mo Money Mo Problems: The Clean(ish) Cashout

    Benjamin Brown
    Fri, 14:30 - 14:55
    Turbo Room - Track 2
  • 15:00
  • Crimewave 101

    Vyrus
    Fri, 15:00 - 15:50
    Main Room - Keynotes
  • 16:00
  • Contest Results

     
    Fri, 16:00 - 16:30
    Main Room - Track 1
  • 16:30
  • Closing

     
    Fri, 16:30 - 17:00
    Main Room - Track 1