• 09:00
  • Defense Against the Dark Arts: Examining, Fixing and Fighting for our Cyber Defenses

    Edward Snowden
    Tue, 09:00 - 10:00
    Keynote Hall - Keynote
  • 10:15
  • Securing Network Communications: An Investigation into Certificate Authorities on Mobile

    Andrew Blaich
    Tue, 10:15 - 11:15
    701A - Tech
  • Introducing G.Tool – A batteries included framework for building awesome GRC tools without wasting money.

    Ben Sapiro
    Tue, 10:15 - 11:15
    701B - Management
  • CANtact: Open Source Automotive Tools

    Eric Evenchick
    Tue, 10:15 - 11:15
    801A - Tech
  • How to build a malware classifier [that doesn’t suck on real-world data]

    John Seymour
    Tue, 10:15 - 11:15
    801B - Tech
  • All roads lead to domain admin, a part of a presentation series: From breach to C.D.E. Part I

    Yannick Bedard
    Tue, 10:15 - 11:15
    803 - Security Fundamentals
  • Understanding Ransomware: Clear and Present Danger

    Raul Alvarez
    Tue, 10:15 - 10:45
    Hall G - Sponsor Track
  • 11:30
  • Eliminating the Automation and Integration Risks of the “Security Frankenstein”

    Christopher E. Pogue
    Tue, 11:30 - 12:00
    701A - Sponsor Track
  • Held for Ransom: Defending your Data Against Ransomware

    James L. Antonakos
    Tue, 11:30 - 12:00
    701B - Sponsor Track
  • The Emerging Era of Cognitive Security

    Peter Allor
    Tue, 11:30 - 12:00
    801A - Sponsor Track
  • An Effective Approach to Automating Compliance Activities

    Dave Miller
    Tue, 11:30 - 12:00
    801B - Sponsor Track
  • When ‘Oops’ Isn’t An Acceptable Answer

    Greg Pepper
    Tue, 11:30 - 12:00
    803 - Sponsor Track
  • Network virtualization to enhance context, visibility and containment

    Bruno Germain
    Tue, 11:30 - 12:00
    Hall G - Sponsor Track
  • 12:00
  • Securing Our Future

    Mikko Hypponen
    Tue, 12:00 - 13:10
    Keynote Hall - Keynote
  • 13:25
  • WiFi Exploitation: How passive interception leads to active exploitation

    Solomon Sonya
    Tue, 13:25 - 14:25
    701A - Tech
  • Getting Business Value from Penetration Testing

    Mark Bassegio, Tim West
    Tue, 13:25 - 14:25
    701B - Management
  • The State of SCADA on the Internet

    Kyle Wilhoit
    Tue, 13:25 - 14:25
    801A - Tech
  • Making sense of a million samples per day: Behavior-based Methods for Automated, Scalable Malware Analysis

    Stefano Zanero
    Tue, 13:25 - 14:25
    801B - Tech
  • Can massive data harvesting drive down the time to breach detection?

    Sean Earhard
    Tue, 13:25 - 14:25
    803 - Security Fundamentals
  • The Industry Need for Cloud Generation Security

    Ryan Leonard
    Tue, 13:25 - 13:55
    Hall G - Sponsor Track
  • 14:40
  • [Ab]using TLS for defensive wins

    Lee Brotherston
    Tue, 14:40 - 15:40
    701A - Tech
  • Safety Should be the Security Paradigm

    Chris Wysopal
    Tue, 14:40 - 15:40
    701B - Management
  • Jihadism and Cryptography, from internet to softwares

    Julie Gommes
    Tue, 14:40 - 15:40
    801A - Tech
  • Practical Static Analysis for Continuous Application Security

    Justin Collins
    Tue, 14:40 - 15:40
    801B - Tech
  • IPv6 for the InfoSec Pro on the Go

    Allan Stojanovic
    Tue, 14:40 - 15:40
    803 - Security Fundamentals
  • Exposing Ransomware: Intelligent cybersecurity for the real world.

    Sean Earhard
    Tue, 14:40 - 15:10
    Hall G - Sponsor Track
  • 14:55
  • Developing your Career in IT Security

    Adrien de Beaupre, Brian Bourne, Mike Murray, Laura Payne
    Tue, 14:55 - 17:00
    Keynote Hall - Career
  • 15:55
  • Crash Course in Kubernetes & Security

    Matt Johansen
    Tue, 15:55 - 16:55
    701A - Tech
  • Security by Consent, or Peel’s Principles of Security Operations

    Brendan O'Connor
    Tue, 15:55 - 16:55
    701B - Management
  • EventID Field Hunter (EFH) – Looking for malicious activities in your Windows events

    Rodrigo Montoro
    Tue, 15:55 - 16:55
    801A - Tech
  • Hack Microsoft by using Microsoft signed binaries

    Pierre-Alexandre Braeken
    Tue, 15:55 - 16:55
    801B - Tech
  • The Security Problems of an Eleven Year Old and How To Solve Them

    Jake Sethi-Reiner
    Tue, 15:55 - 16:55
    803 - Security Fundamentals
  • Next-Gen Now, Outsmarting ransomware, exploits and zero-day attacks

    Keir Humble
    Tue, 15:55 - 16:25
    Hall G - Sponsor Track