Attack and Defend with Powershell: Introduction
Aelon Porat
Identify, exploit, and chain web app vulnerabilities
John Poulin
Memory Forensics 101 Xmen vs. Magneto
Mari DeGrazia
Practical Malware Analysis
Sam Bowne
Testing like a Ghost
Catatonic