Keynote

Neil Wyler

Cryptography Fundamentals

Chris Schiffhauer

Deconstructing The Cyber Kill Chain of Angler Campaign

Artsiom Holub

Developing and Testing an Effective Incident Response Program

Andy Jordan

Diving into 2-factor authentication – a hacker's quick start guide to using the YubiKey

Heisenberg

Easy Mobile Hacking

Aaron Guzman (@scriptingxss)

Fight Fire with Fire: Using Offensive Techniques to Dominate Defense

Danny Quist

Get Hired! (A hiring manager's perspective)

Glen Walker

Hacking for Fun and Profit - Legally

Heather Wilde

Ham Radio - There is more to it than EMCOMM

Tim "NullOverflow" Li

Hipster Frameworks and 0ld 5k00l 3xpl01t5

Seth Law (@sethlaw)

How I Exfiltrate Data From Your Secure Network: Hiding Data in Plain Sight

Joe Gervais (TryCatchHCF)

Httpillage: Calling all Nodes

John Poulin

Hunting Malware with Timelines

Mari DeGrazia

Jams, Cans and Qubes

Kyle Rankin

JoeCrypter, Anti-automated Analysis Crypter

Joe Giron

Leveraging Game Theory and Machine Learning for Proactive Cyber Threat Intelligence

Paulo Shakarian

Machining, A Love Story

XlogicX

PDNS for Pentesters

James Pleger

Real Hacking

Sam Bowne

Reversing and Exploiting Embedded Devices (Walking the software and hardware stack)

Elvis Collado (b1ack0wl)

S.E.R.E. School for Threat Intelligence — Part 1. URL Scanners

Neil Smith

Telling Lies & Making Friends: Penetrating Peoples' Emotional Barriers

Candis Orr and Drew Redshift Porter

The Golden Ticket Attack - A Look Under the Hood

Gerard Laygui

The HeartBrainLungs Theory: Integrating Data Products to InfoSec Programs

Andre Gironda

Tracing “cR3d$”: Tracking the DeepWeb and OSINT gathering

Blake n01 Butler

WTF is Browser Hacking?

Christian Frichot (@xntrik)