T-Rex
Around the world in 80 Cons (A tale of perspectives)
Jayson E Street
Infosec in the 21st century
Tim Crothers
Securing our Ethics: Ethics and Privacy in a Target-Rich Environment
Kevin Johnson
Social Engineering Can Kill Me, But It Can’t Make Me Care
Gavin ‘Jac0byterebel’ Ewan
Finding Our Way – From Pwned to Strategy
David Kennedy (Likely lost due to sound guy not muting music, plan to
post to archive.org to see if anyone can clean the tracks)
Emulate SandBox and VMs to avoid malware infections
Jordi Vazquez (Likely lost due to sound guy not muting music, plan to
post to archive.org to see if anyone can clean the tracks)
Security Hopscotch
Chris Roberts (Likely lost due to sound guy not muting music, plan to
post to archive.org to see if anyone can clean the tracks)
Email DLP: Simple concept, often poorly implemented
c0rrup7_R3x (Likely lost due to sound guy not muting music, plan to post
to archive.org to see if anyone can clean the tracks)
Look Observe Link (LOL) – How I learned to love OSINT
NinjaSl0th (Half lost due to sound guy not muting music, plan to post to
archive.org to see if anyone can clean the tracks)
ZitMo NoM
David “HealWHans” Schwartzberg
Bigger Boys Made Us
Mike Kemp
Full Douchesclosure
Duncan Manuts
Finux’s Historical Tour Of IDS Evasion, Insertions, and Other Odditie
Arron ‘Finux’ Finnon
Velociraptor
Beating the Infosec Learning Curve Without Burning Out
Scott ‘secureholio’ Thomas
Picking Blackberries
Thomas 'G13' Richards
Exercising with Threat Models
J Wolfgang Goerlich
Seeing Purple: Hybrid Security Teams for the Enterprise
B31tf4c3
CryptoRush – Rising from the Ashes
King Dragon
Autonomous Remote Hacking Drones
Dr. Phil Polstra
Proof That Windows Computer Forensics is Sexy
Kyle ‘Chaoticflaws’ Andrus
BioHacking: Becoming the Best Me I Can Be
Leonard
Vulnerable By Design – The Backdoor That Came Through the Front
Matthew ‘mandatory’ Bryant
OAuth2.0 – It’s the Implementation Stupid!!
Tony Miller
Breach Stains
Matt ‘The Streaker’ Johnson
Are you a janitor, or a cleaner?
John ‘geekspeed’ Stauffacher & Matthew ‘Mattrix’ Hoy
PCI and Crypto: The Good, The Bad, and The Frankly Ugly
Robert Former
Stegosaurus
Advanced Threats and Lateral Movement
Terrance Davis
Adopting a Risk-based Threat Model to Secure Your Defenses and Regain
Control of Your Critical Data
Todd Bursch
New World, New Realities: Endpoint threat Detection, Response and
Prevention
Brian Orr
Reducing Your Organization’s Social Engineering Attack Surface
Jen Fox
Memory Forensics with Hyper-V Virtual Machines
Wyatt Roersma
$#!T My Industry Says. . .
Kellman Meghu
Bringing PWNED To You: Interesting Honeypot Trends
Elliott Brink
The Security Implications of Software Defined Networks
Shane Praay
Lessons from the front lines: Top focus areas for information security
leaders
Shogo Cottrell
How to budget IDS’s
Brian ‘Arcane’ Heitzman
LEVIATHAN: Command and Control Communications on Planet Earth
Kevin Thompson
Red Teaming: Back and Forth, 5ever
FuzzyNop
Intelligence Driven Security
Shane Harsch
Security for the People: End-User Authentication Security on the
Internet
Mark Stanislav
Hackers Are People Too
Infosystir
Vaccinating APK’s
Milan Gabor
Brontosaurus
Hack the Hustle! Career Strategies For Information Security
Professionals
Eve Adams
The Challenge of Natural Security Systems
Rockie Brockway
Application Pen Testing
Chris Pfoutz
Advanced Breaches of 2013 vs. Behavioral Detection
Charles Herring
Security On The Cheap
Joel Cardella
Hacking Android
Godfrey Nolan
Cyber Security Incidents: Red Blue Team
Unc13 Fuck3r
Extra
Board Breaking Challenge
GrrCON Talent Accelerator Program
Abe Jones
Closing