Title |
Speakers |
Summary |
Topic Types |
Opening Words |
Hanna Birna Kristjánsdóttir
|
N/A |
|
KEYNOTE: The InfoSec Evolution Will Be Televised – and You’re the Stars. |
Katie Moussouris
|
N/A |
|
Eight Conflicts That Changed Cyberspace. |
Jason Healey
|
N/A |
|
Operating * By the Numbers. |
Allison Miller
|
N/A |
|
Do As I Say, Not As I Do: The Law Only Has Two Sides When You Get Caught |
Stephen Watt
|
N/A |
|
Penny, Brain, and Inspector Gadget |
Don Andrew Bailey
|
N/A |
|
Attack-Driven defense |
Zane Lackey
|
N/A |
|
Polishing Chrome for Fun and Profit |
Nils
,
Jonathan Butler
|
N/A |
|
Plaso – reinventing the super timeline |
Kristinn Guðjónsson
|
N/A |
|
Taint Nobody Got Time for Crash Analysis II |
Richard Johnson
|
N/A |
|
Context Clues: How Today’s Security Leaders Leverage Event Metadata, Frequency & Relationships to Identify Malicious Activity Faster and Make Better Decisions |
Richard Johnson
|
N/A |
|
GoPro or GTFO: A Tale of Reversing an Embedded System |
Zach Lanier
,
Todd Manning
|
N/A |
|
From the Trenches: Real-World Agile SDLC |
Chris Eng
,
Ryan O’boyle
|
N/A |
|
F**k 0-days, We Will Pwn U with Hardware Mofos |
Yaniv Miron
,
Mc
|
N/A |
|
Threats in a virtual world |
Charlie Eriksen
|
N/A |
|
KEYNOTE: Ten Years Gone: A Decade of Hackf00 and the Road Ahead. |
Dhillon Kannabhiran
|
N/A |
|
How great companies fight, survive, and thrive in the era of targeted and advanced persistent threats. |
Jeff Stutzman
|
N/A |
|
h4x0r Inc? |
Doug Britton
|
N/A |
|
NSA & the end of privacy |
Birgitta Jónsdóttir
|
N/A |
|
Cloud Computing and virtual computers – Challenges in ISO/IEC standards |
Guðjón Viðar Valdimarsson
|
N/A |
|
Who goes there? The importance of authentication of identity. |
Arnaldur Axfjörð
|
N/A |
|
Upping the game: How to play advanced games with couture rootkits |
Josh m0nk Thomas
|
N/A |
|
Data Driven Web Application Security |
Mike Arpaia
,
Kyle Barry
|
N/A |
|
.NET: The Framework, The Myth, The Legend David Litchfield / Dissection of a database security breach. |
Kelly Lum
|
N/A |
|
The Mathematics of Wonton Burrito Meals |
Snare
|
N/A |
|
An Examination of String Allocations: IE-9 Edition |
Chris Valasek
|
N/A |
|
How to hack a country for fun and profit. |
David Jacoby
|
N/A |
|
Hacking Like in the Movies: Visualizing Page Tables for Local Exploitation |
Georg Wicherski
,
Alex Radocea
|
N/A |
|