Security

Title Speakers Conference Tags
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic. Joseph y. Halpern CSF-2013 - Louisiana,USA Security
Information Flow 1 Catuscia Palamidessi CSF-2013 - Louisiana,USA Security
Language-based security 1 Gilles Barthe CSF-2013 - Louisiana,USA Security
Language-based security 2 David Basin CSF-2013 - Louisiana,USA Security
Invited talk Stephen Chong CSF-2013 - Louisiana,USA Security
Access control Joshua Guttman CSF-2013 - Louisiana,USA Security
Quantitative security Boris K\xc3\xb6pf CSF-2013 - Louisiana,USA Security
The SAFE Machine: An Architecture for Pervasive Information Flow. Benjamin c. Pierce CSF-2013 - Louisiana,USA Security
Information Flow 2 Limin Jia CSF-2013 - Louisiana,USA Security
Privacy and cryptography Matteo Maffei CSF-2013 - Louisiana,USA Security
Managing Security Risks at the Speed of Business Rob Goldberg Shakacon-2013 - Honolulu,USA Security
Smart Cards and Single Sign On - The Dark Secrets of Windows Enterprise Authentication & Credentials Colin Ames Shakacon-2013 - Honolulu,USA Security
Open Source Threat Intelligence Kyle Maxwell Shakacon-2013 - Honolulu,USA Security
Android Phones Can Do That?!? Custom Tweaking for Power Security Users Deviant Ollam Shakacon-2013 - Honolulu,USA Security
How Trustworthy are your Sand (de)fences? Rahul Kashyap Shakacon-2013 - Honolulu,USA Security
Android 4.0: Ice Cream "Sudo Make Me a" Sandwich Max Sobell Shakacon-2013 - Honolulu,USA Security
Privacy for Security Geeks - Dancing with Lawyers Jason Shirk Shakacon-2013 - Honolulu,USA Security
Defense is not that hard? So, why is no one doing it right? Kevin Cardwell Shakacon-2013 - Honolulu,USA Security
Pentesting iOS Apps - Runtime Analysis & Manipulation Andreas Kurtz Shakacon-2013 - Honolulu,USA Security
Shodan: Computer Search Engine Dan Tentler Shakacon-2013 - Honolulu,USA Security
Social Media Digital Forensics Brian Lockrey Shakacon-2013 - Honolulu,USA Security
Keynote - freedom or control ? Jérémie Zimmermann Nuit-2013 - Paris,France Security
[EN] Thinking Outside of the Box Dave Kennedy Nuit-2013 - Paris,France Security
[FR] Attacking e-voting: a concrete case Sebastien Andrivet Nuit-2013 - Paris,France Security
[EN] Cracking and analyzing Apple iCloud protocols: iCloud backups, Find My iPhone, document storage Vladimir Katalov Nuit-2013 - Paris,France Security
[EN] Abusing Browser User Interfaces for fun & profit Rosario Valotta Nuit-2013 - Paris,France Security
[EN] From kernel space to user heaven Jaime S\xc3\xa1nchez Nuit-2013 - Paris,France Security
[EN] Love letters to Frank Abagnale (Oh how I PWN thee let me count the ways) Jayson E. Street Nuit-2013 - Paris,France Security
[FR] Behind the Scenes of Web Attacks Davide Canali Nuit-2013 - Paris,France Security
I got 99 problems but a kernel pointer ain't one Alex Ionescu REcon-2013 - Montreal,Canada Security
Apple iCloud services reversed inside out Oleg Afonin REcon-2013 - Montreal,Canada Security
Just keep trying ! Unorthodox ways to hack an old-school hardware Bacura REcon-2013 - Montreal,Canada Security
The Future of RE: Dynamic Binary Visualization Christopher Domas REcon-2013 - Montreal,Canada Security
OpenGarages: Vehicle Research Labs Craig Smith REcon-2013 - Montreal,Canada Security
New ways to manage secret for software protection. David Baptiste REcon-2013 - Montreal,Canada Security
Reversing P25 Radio Scanners Gabriel Tremblay REcon-2013 - Montreal,Canada Security
XNU Spelunking or Fuzzing the kernel inside your kernel "jesse D'aguanno" REcon-2013 - Montreal,Canada Security
Hiding @ Depth Josh "m0nk" Thomas REcon-2013 - Montreal,Canada Security
Reversing and Auditing Android's Proprietary Bits Joshua j. Drake REcon-2013 - Montreal,Canada Security
Haow do I sandbox?!?! Jurriaan Bremer REcon-2013 - Montreal,Canada Security
Many More Tamagotchis Were Harmed in the Making of this Presentation Natalie Silvanovich REcon-2013 - Montreal,Canada Security
Hardware reverse engineering tools Olivier Thomas REcon-2013 - Montreal,Canada Security
Reversing HLR, HSS and SPR: rooting the heart of the Network and Mobile cores from Huawei to Ericsson Philippe Langlois REcon-2013 - Montreal,Canada Security
BYOD - The Privacy and Compliance Risks from Bringing Your Own Mobile Device to Work Winn Schwartau hackinparis-2013 - Paris,France Security
The Control of technology by nation state : Past, Present and Future - The Case of Cryptology and information security Eric Filiol hackinparis-2013 - Paris,France Security
Analysis of a Windows Kernel vulnerability : from espionage to criminal use Julia Wolf hackinparis-2013 - Paris,France Security
Burp Pro : Real-life tips and tricks Nicolas Gr\xc3\xa9goire hackinparis-2013 - Paris,France Security
I'm in your browser, powning your stuff - Attacking Google Chrome extensions Krzysztof Kotowicz hackinparis-2013 - Paris,France Security
Are we getting better? - Hacking Todays Technology Dave Kennedy hackinparis-2013 - Paris,France Security
Origin policy enforcement in modern browsers Frederik Braun hackinparis-2013 - Paris,France Security
Malware vs Virtualization : The endless cat and mouse play Aur\xc3\xa9lien Wailly hackinparis-2013 - Paris,France Security
Web Applications Forensics Jens M\xc3\xbcller hackinparis-2013 - Paris,France Security
DBI Frameworks applied to computer security : Uses and comparative Ricardo j. Rodriguez hackinparis-2013 - Paris,France Security
The inner HTML Apocalypse : How MXSS attacks change everything we believed to know so far Mario Heiderich hackinparis-2013 - Paris,France Security
A Simple Tracing Algorithm for Binary Fingerprinting Code under Averaging Attack Minoru Kuribayashi IHMMSEC-2013 - Montpellier,France Security
An Asymmetric Fingerprinting Code for Collusion-Resistant Buyer-Seller Watermarking Serdar Pehlivanoglu IHMMSEC-2013 - Montpellier,France Security
Privacy and Security Challenges in the Smart Grid User Domain Dominik Engel IHMMSEC-2013 - Montpellier,France Security
Exposing Digital Audio Forgeries in Time Domain by Using Singularity Analysis with Wavelets Shijun Xiang IHMMSEC-2013 - Montpellier,France Security
Conference Opening & Welcome Remarks Chris Gibson FIRST-2013 - Bankgkok,Thailand Security
Keynote Presentation: INTERPOL Global Complex for Innovation--Facilitating international police cooperation to combat cybercrime James Pang FIRST-2013 - Bankgkok,Thailand Security
Big Data, Big Breaches, Big Headaches Scott Mcintyre FIRST-2013 - Bankgkok,Thailand Security
Chasing the Fox: A closer look at an APT malware Andreas Schuster FIRST-2013 - Bankgkok,Thailand Security
CERT/CC - SEI CMU, US\tCyber-EXE Poland 2012. How to organize the cyber exercises on a national level. Miroslaw Maj FIRST-2013 - Bankgkok,Thailand Security
Industrial Owner's Manual: Case studies in publicly accessible ICS Eireann Leverett FIRST-2013 - Bankgkok,Thailand Security
Using Threat Intelligence and Incident Response in Modern Malware Warfare Kyle Wilhoit FIRST-2013 - Bankgkok,Thailand Security
Mining Billion Nodes Malicious Network Behavior in Practice—Chinese Taipei Perspective Ching-hao Mao FIRST-2013 - Bankgkok,Thailand Security
Keynote: Economic Products and By-products of Open, Shared, Real Time Sinkholes--Lessons From GhostClick and Conficker Paul A. Vixie FIRST-2013 - Bankgkok,Thailand Security
FIRST Session: FIRST Financials Review Peter Allor FIRST-2013 - Bankgkok,Thailand Security
Virut Botnet Takedown Przemek Jaroszewski FIRST-2013 - Bankgkok,Thailand Security
Tracing Botnet in Chinese Taipei Kai-chi Chang FIRST-2013 - Bankgkok,Thailand Security
Declared Level of Response as a Voluntary CERT Community Cooperation Model in Incident Handling Krzysztof Silicki FIRST-2013 - Bankgkok,Thailand Security
BlackHole, the hidden stuff beyond the spotlight Adnan Shukor FIRST-2013 - Bankgkok,Thailand Security
Lessons Learned in Automating Threat Intelligence Sharing with Open IOC Douglas Wilson FIRST-2013 - Bankgkok,Thailand Security
Nfsen + Hadoop Vytautas Krakauskas FIRST-2013 - Bankgkok,Thailand Security
Combating Insider Threats and Targeted Attacks Matt Mckinley FIRST-2013 - Bankgkok,Thailand Security
Timeline of a 0-Day: Reducing Exposure Through Information Sharing Alex Kirk FIRST-2013 - Bankgkok,Thailand Security
Analysis of DNS data from Chinese Telecom Operators Chunyang Yuan FIRST-2013 - Bankgkok,Thailand Security
Enabling the Secure Exchange of Cyber Security Information Kathleen Moriarty FIRST-2013 - Bankgkok,Thailand Security
Detecting Malware infections through DNS live monitoring Hector Ortiz FIRST-2013 - Bankgkok,Thailand Security
When security incidents drive an incumbent ISP to change its security strategy 180 degrees Martijn Heide FIRST-2013 - Bankgkok,Thailand Security
Incubations: Cyber Espionage Operators and Their Tools Brandon Dixon FIRST-2013 - Bankgkok,Thailand Security
Implementing the Traffic Light Protocol at US-CERT: Minutes to Learn, a Lifetime to Master Thomas Millar FIRST-2013 - Bankgkok,Thailand Security
Journeys Through Unallocated Space Timothy Slaybaugh FIRST-2013 - Bankgkok,Thailand Security
Building a Guerilla CSIRT Software Development Team Chris Horsley FIRST-2013 - Bankgkok,Thailand Security
Zeus Gameover - P2P Spyware at Work Tomasz Bukowski FIRST-2013 - Bankgkok,Thailand Security
Ten Years of Data Sharing for Mitigation - Lessons Learned and the Long Road Ahead Rod Rasmussen FIRST-2013 - Bankgkok,Thailand Security
Conducting Technical Incident Investigations on Apple iOS Devices Kenneth van Wyk FIRST-2013 - Bankgkok,Thailand Security
The Korean Intrusion Spree Snorre Fagerland FIRST-2013 - Bankgkok,Thailand Security
Vulnerability Handling Processes: When Hackers Come A-Knockin Katie Moussouris FIRST-2013 - Bankgkok,Thailand Security
Conducting Technical Incident Investigations on Apple iOS Devices Continued\tMonitoring DDoS Botnets in the Wild to Understand Behavior and Collect Intel Shahan Sudusinghe FIRST-2013 - Bankgkok,Thailand Security
Center for Interdisciplinary Studies in Security and Privacy New York University Abu Dhabi, TR \tCyber Security Strategy @ EU Francisco garc\xc3\xada Mor\xc3\xa1n FIRST-2013 - Bankgkok,Thailand Security
Intelligent Defence: deriving malicious intent using domain registrar information Michael Jordon FIRST-2013 - Bankgkok,Thailand Security
Findings About Massive Cyber Attack Emergence Mechanisms in Japan Mariko Miya FIRST-2013 - Bankgkok,Thailand Security
A Glimpse Into the Future: The Evolution of Cybercrime in the Next Decade Ziv Mador FIRST-2013 - Bankgkok,Thailand Security
Exploiting the Top Ten Database Vulnerabilities and Misconfigurations Josh Shaul BSideSRhodeIsland-2013 - Rhode Island,USA Security
Exploit Development for Mere Mortals Joe Mccray BSideSRhodeIsland-2013 - Rhode Island,USA Security
Talk: Offensive Security Rob Graham BSideSRhodeIsland-2013 - Rhode Island,USA Security
Large-Scale Application Security Charlie Eriksen BSideSRhodeIsland-2013 - Rhode Island,USA Security
SMB SRMF for identifying top 10 risks Jim Peeler BSideSRhodeIsland-2013 - Rhode Island,USA Security
Show and Tell: Super MiniPwner James Edge BSideSRhodeIsland-2013 - Rhode Island,USA Security
Talk More Better (Or, how better presentations and storytelling techniques can help you communicate more effectively). Jack Daniel BSideSRhodeIsland-2013 - Rhode Island,USA Security
Lessons Learned: Why I became a PaulDotCom Intern and why you should become an Intern too. Mike Perez BSideSRhodeIsland-2013 - Rhode Island,USA Security
Learning Security on the Cheap Patrick Laverty BSideSRhodeIsland-2013 - Rhode Island,USA Security
Cyber Security Defense– Establishing an Action Plan Matthew Yarbrough CISOSocal-2013 - California,USA Security
Starting from Scratch – A CISO’s Journey Jonathan Chow CISOSocal-2013 - California,USA Security
The Threat Landscape – Staying Ahead of Change Marc Maiffret CISOSocal-2013 - California,USA Security
Security By and For the People Josh Davis CISOSocal-2013 - California,USA Security
Focusing on Your Data to Change the Information Security Game Lamont Orange CISOSocal-2013 - California,USA Security
Universalizing the Language of Risk Management Tim Mccreight CISOVancouver-2013 - Vancouver,Canada Security
Your Partner in Security – Building Better Business through 360° Alignment Baden Smith CISOVancouver-2013 - Vancouver,Canada Security
Embracing the Evolution – Harnessing the Competitive Advantage of Cloud Technologies Larry Carson CISOVancouver-2013 - Vancouver,Canada Security
Big Data without Security = Big Risk Alan Kessler CISOVancouver-2013 - Vancouver,Canada Security
Developing the BC Services Card Ian Bailey CISOVancouver-2013 - Vancouver,Canada Security
Powering BC – How Technology is Transforming BC Hydro Kip Morison CISOVancouver-2013 - Vancouver,Canada Security
Compliance through Abstinence – Achieving Compliance by Starting Over Michel Labelle CISOVancouver-2013 - Vancouver,Canada Security
Information Security in the Boardroom Jeff von Gillern CISOMinneapolis-2013 - Minneaspolis,USA Security
Training for Nothin’, Skills for Free Michael l. Kearn CISOMinneapolis-2013 - Minneaspolis,USA Security
Pioneering Public Security – Building the Minnesota Health Insurance Marketplace Barry Caplin CISOMinneapolis-2013 - Minneaspolis,USA Security
Running with Change – The Development of Medtronic’s Global Security Program Michael Mcneil CISOMinneapolis-2013 - Minneaspolis,USA Security
Focusing on Your Data to Change the Information Security Game Lamont Orange CISOMinneapolis-2013 - Minneaspolis,USA Security
Federal Strategies for Preparing and Protecting Against Cyber Attacks Ronald Yearwood CISOMinneapolis-2013 - Minneaspolis,USA Security
What’s REALLY Happening on Your Network? Matt Keil CISOMinneapolis-2013 - Minneaspolis,USA Security
Paper 3 Nickson menza Karie ADFSL-2013 - Virginia,USA Security
Modern Malware Christopher Elisan BSidesCharlotte-2013 - Carolina,USA Security
Mobile Device Security Denny Deaton BSidesCharlotte-2013 - Carolina,USA Security
Security Onion: Peeling Back the Layers of Your Network in Minutes Doug Burks BSidesCharlotte-2013 - Carolina,USA Security
Bringing The Sexy Back To…Defense In Depth Martin Fisher BSidesCharlotte-2013 - Carolina,USA Security
Why Your IT Bytes Frank j. Hackett BSidesCharlotte-2013 - Carolina,USA Security
BEATING A LESS-DEAD HORSE: THE CURRENT STATE OF .NET REVERSING Aloria SummerCon-2013 - New York,USA Security
INTRODUCTION TO DYNAMIC DALVIK INSTRUMENTATION (ON ANDROID) Collin Mulliner SummerCon-2013 - New York,USA Security
ON-CHIP DEBUG INTERFACES Joe ( Kingpin ) Grand SummerCon-2013 - New York,USA Security
PORTSCANNING LOW EARTH ORBIT Travis Goodspeed SummerCon-2013 - New York,USA Security
WEIGHING IN ON ISSUES WITH CLOUD SCALE Michael Coppola SummerCon-2013 - New York,USA Security
BYPASSING ALL OF THE THINGS Aaron Portnoy SummerCon-2013 - New York,USA Security
TAINT NOBODY GOT TIME FOR CRASH ANALYSIS Richard Johnson SummerCon-2013 - New York,USA Security
I popped the penguin, now what? Recon and maintaining access in Linux system Mark Kikta BSidesDetroit-2013 - Detroit,USA Security
In case of ZOMBIES break glass Christopher Payne BSidesDetroit-2013 - Detroit,USA Security
Advanced Password Recovery Techniques and Modern Mitigation Strategies John Moore BSidesDetroit-2013 - Detroit,USA Security
Imagine having access to an amazing technology, that makes searching patterns of data in the network very simple. Then imagine implementing that technology on an open wifi and seeing what you find. Th Kellman Meghu BSidesDetroit-2013 - Detroit,USA Security
The Rising Tide of Ransomware Chester Wisniewski BSidesDetroit-2013 - Detroit,USA Security
Be vewy vewy quiet, we're hunting hackers - Honeypots and the fun you can you have. Keith Dixon BSidesDetroit-2013 - Detroit,USA Security
Building Securable Infrastructures Steve Aiello BSidesDetroit-2013 - Detroit,USA Security
Looking Through the Peephole (OSSEC) James Siegel BSidesDetroit-2013 - Detroit,USA Security
Creating A Powerful User Defense Against Attackers Ben Ten BSidesDetroit-2013 - Detroit,USA Security
From Patch to Pwnd "Exploiting faulty firmware patch features to compromise MFP Devices" Deral Heiland BSidesDetroit-2013 - Detroit,USA Security
The Moscow Rules for InfoSec Professionals: Achieve Detente to Secure the Enterprise Jen Fox BSidesDetroit-2013 - Detroit,USA Security
The Ever-evolving Threat Landscape Jeff Multz BSidesDetroit-2013 - Detroit,USA Security
How I Learned to Stop Worrying and Love BYOD Kevin Poniatowski BSidesDetroit-2013 - Detroit,USA Security
Incident Management with PowerShell Matt Johnson BSidesDetroit-2013 - Detroit,USA Security
So You Want to Hire a Penetration Tester?: 10 Tips for Success Mark Stanislav BSidesDetroit-2013 - Detroit,USA Security
Beginning Malware Research: Terminal Velocity Through The Rabbit Hole James Slaughter BSidesDetroit-2013 - Detroit,USA Security
Broke, Not Broken: An Effective Information Security Program With a $0 Budget Paul Melson BSidesDetroit-2013 - Detroit,USA Security
Zeus C&C for Tech Support David healwhans Schwartzberg BSidesDetroit-2013 - Detroit,USA Security
Training Citizen Cyber Warriors on the Michigan Cyber Range Joe Adams BSidesDetroit-2013 - Detroit,USA Security
Critical Security Controls for Effective Cyber Defense Ken Evans BSidesDetroit-2013 - Detroit,USA Security
Hack the Hustle! Eve Adams BSidesDetroit-2013 - Detroit,USA Security
$45 Pentesting Device Phil Polstra BSidesDetroit-2013 - Detroit,USA Security
A Cascade of Pebbles: How Small Incident Response Mistakes Make for Big Compromises Josh Little BSidesDetroit-2013 - Detroit,USA Security
If You Can Open The Terminal, You Can Capture The Flag: CTF For Everyone. Nicolle ( rogueclown ) Neulist BSidesDetroit-2013 - Detroit,USA Security
Insidious Implicit Windows Trust Relationships James C. Foster BSidesDetroit-2013 - Detroit,USA Security
Intelligence meets Infosec: Lisbeth Salander v James Bond Antitree BSidesDetroit-2013 - Detroit,USA Security
Penetration Testing: What They Don't Teach You In School Alex Fernandez-gatti BSidesDetroit-2013 - Detroit,USA Security
Teaching Your Workforce to Lie, Cheat, & Steal Dug Song BSidesDetroit-2013 - Detroit,USA Security
"Threat and Risk Analysis With (PASTA) Process of Attack Simulation and Threat Analysis", Marco M. Morana AthCON-2013 - Athens,Greece Security
"The missing piece of Defence-in-Depth: Applying the \'Grand Strategy of the Roman Empire\' to today\'s cyberwars ", Emmanouil Serrelis AthCON-2013 - Athens,Greece Security
"Protecting the corporate information. The insider threat : risks and countermeasures", Gerasimos Moschonas AthCON-2013 - Athens,Greece Security
"Capitalizing the Momentum - Cloud Security", Katerina Kalimeri AthCON-2013 - Athens,Greece Security
"Countering Advanced Persistent Threats with HP Enterprise Security", Ioannis Mangos AthCON-2013 - Athens,Greece Security
"The Future of Web Applications", Yiannis Litsas AthCON-2013 - Athens,Greece Security
"Rooting your internals: custom shellcode, BeEF and Inter-Protocol Exploitation", Michele Orru AthCON-2013 - Athens,Greece Security
"Spy-Pi: Do you trust your laptop docking stations?", Andy Davis AthCON-2013 - Athens,Greece Security
"Hacking Appliances: Ironic exploits in security products", Ben Williams AthCON-2013 - Athens,Greece Security
"Automated analysis and Deobfuscation of Android Apps & Malware", Jurriaan Bremer AthCON-2013 - Athens,Greece Security
"Attacking NFC Mobile Wallets: Where Trust Breaks Down", Max Sobell AthCON-2013 - Athens,Greece Security
"Security Research and Development Framework", Amr Thabet AthCON-2013 - Athens,Greece Security
"An audio chaotic stego communication system", Antonios s. Andreatos AthCON-2013 - Athens,Greece Security
"Hacking SIP Services Like a Boss!", Fatih Ozavci AthCON-2013 - Athens,Greece Security
"The Sandbox difference or how an integration feature impacts on the sandbox", Yury Chemerkin AthCON-2013 - Athens,Greece Security
"PROTOS: A PROactive Threat Observatory System", Vasileios Vlachos AthCON-2013 - Athens,Greece Security
Opening Speech Hamza Kandur NOPCon-2013 - Istanbul,Turkey Security
Introducing NOPcon Celil Unuver NOPCon-2013 - Istanbul,Turkey Security
Developing Custom tools for real world penetration test Gokhan Alkan NOPCon-2013 - Istanbul,Turkey Security
dont touch my winny Moti Joseph NOPCon-2013 - Istanbul,Turkey Security
DEP Bypass/Rop exploiting Canberk Bolat NOPCon-2013 - Istanbul,Turkey Security
Exploiting hardware pool corruptions in Microsoft Windows Kernal Nikita Tarakanov NOPCon-2013 - Istanbul,Turkey Security
Hybrid Defense: how to protect yourself from polymorphic 0-days Svetlana Gaivoronski NOPCon-2013 - Istanbul,Turkey Security
Address of the President of the Republic of Estonia Toomas hendrik Ilves CyCON-2013 - Tallinn, Estonia Security
Cyber Conflict: A Military Perspective Keith b. Alexander CyCON-2013 - Tallinn, Estonia Security
Cyber Defence for NATO: An Operational Perspective Ilker Duranlioglu CyCON-2013 - Tallinn, Estonia Security
Threat Implications of the Internet of Things Michael j. Covington CyCON-2013 - Tallinn, Estonia Security
Exploring the Prudent Limits of Automated Cyber Attack Jeffrey l. Caton CyCON-2013 - Tallinn, Estonia Security
Autonomous Intelligent Agents in Cyber Offence Alessandro Guarino CyCON-2013 - Tallinn, Estonia Security
Cyber Operations: the Need for an Adequate Toolbox Hans Folmer CyCON-2013 - Tallinn, Estonia Security
Automated Offense and Defense – Response, Concepts and Risks Anthony Guess-johnson CyCON-2013 - Tallinn, Estonia Security
Complexity and Emergence in Ultra-Tactical Cyberspace Operations Jeffrey l. Caton CyCON-2013 - Tallinn, Estonia Security
Automation in Cyber Incident Response – the future? Elliott Atkins CyCON-2013 - Tallinn, Estonia Security
Autonomous Weapon Systems and International Law Michael n. Schmitt CyCON-2013 - Tallinn, Estonia Security
Anonymous & Automated Methods Keren Elazari CyCON-2013 - Tallinn, Estonia Security
Upcoming Technical Challenges in Cyber Defence Jens T\xc3\xb6lle CyCON-2013 - Tallinn, Estonia Security
The Dawn of Kinetic Cyber Scott d. Applegate CyCON-2013 - Tallinn, Estonia Security
Legal Aspects of a Cyber Immune System Janine Hiller CyCON-2013 - Tallinn, Estonia Security
Autonomous Decision-Making Processes and the Responsible Cyber Commander Jody m. Prescott CyCON-2013 - Tallinn, Estonia Security
Adjunct Professor, Department of Political Science, University of Vermont\tIllicit Network Structures in Cyberspace Kaarel Kalm CyCON-2013 - Tallinn, Estonia Security
Cyber Deception and Autonomous Attack – Is There a Legal Problem? William Boothby CyCON-2013 - Tallinn, Estonia Security
How to Use Inter-Domain Routing in Cyber Conflicts Olaf Maennel CyCON-2013 - Tallinn, Estonia Security
Moral Responsibility for Hybrid Systems in Cyber Warfare, a Case for Distributed Morality Mariarosaria Taddeo CyCON-2013 - Tallinn, Estonia Security
Research Fellow in Cyber Security and Ethics, PAIS, University of Warwick, Research Associate - Uehiro Centre for Practical Ethics, University of Oxford\tA Baseline Study of Potentially Malicious Acti Barry Irwin CyCON-2013 - Tallinn, Estonia Security
Automatic Malware Detection in High-speed Backbone Networks Assaf Keren CyCON-2013 - Tallinn, Estonia Security
Cyber-attacks Against UAV Platforms: A Viable Threat or Media-induced Hysteria? Sachin Deodhar CyCON-2013 - Tallinn, Estonia Security
Towards a Cyber Conflict Taxonomy Scott d. Applegate CyCON-2013 - Tallinn, Estonia Security
Center for Secure Information Systems, George Mason University Angelos Stavrou CyCON-2013 - Tallinn, Estonia Security
Data security and privacy in the cloud Pierangela Samarati IFIPTM-2013 - Malaga,Spain Security
Contingency Revisited: Secure Construction and Legal Implications of Verifiably Weak Integrity, Henrich c. P\xc3\xb6hls IFIPTM-2013 - Malaga,Spain Security
Security: proactive or reactive? Science or best practices?" Jorge Cuellar IFIPTM-2013 - Malaga,Spain Security
Noninterference Analysis of Delegation Subterfuge in Distributed Authorization System, Simon Foley IFIPTM-2013 - Malaga,Spain Security
Keynote Speech: Amardeo Sarma IFIPTM-2013 - Malaga,Spain Security
Reducing Cost by Assurance in the Early Phases of SDLC, Pawel Krawtzyk IFIPTM-2013 - Malaga,Spain Security
Markets for Discovery of Software Vulnerabilities or the New Malware, Alfonso de Gregorio IFIPTM-2013 - Malaga,Spain Security
Lessons from ANIKETOS Project, Dhouha Ayed IFIPTM-2013 - Malaga,Spain Security
Software Assurance and Cybersecurity, Volkmar Lotz IFIPTM-2013 - Malaga,Spain Security
System Evolution and Security: Security Risk Assessment for Complex Long-lived Systems, Paul Stephane IFIPTM-2013 - Malaga,Spain Security
Identity Assurance, Paul Thomas IFIPTM-2013 - Malaga,Spain Security
DEMO Session ANIKETOS demo Erkuden Rios IFIPTM-2013 - Malaga,Spain Security
An Automatic Trust Calculation Based on the Improved Kalman Filter Detection Algorithm, Bo Ye IFIPTM-2013 - Malaga,Spain Security
Keynote Chris Wysopal RVAsec-2013 - Richmond,USA Security
Badge Intro Jamie Duncan RVAsec-2013 - Richmond,USA Security
BYOD: Risks, Maturity, and Solutions Adam Ely RVAsec-2013 - Richmond,USA Security
The Digital Battlefield Colby Clark RVAsec-2013 - Richmond,USA Security
Interesting Times: Will Business Survive? Ben Tomhave RVAsec-2013 - Richmond,USA Security
Social Media Digital Forensics Brian Lockrey RVAsec-2013 - Richmond,USA Security
Risk Assessment — The Heart of Information Security Barry Kouns RVAsec-2013 - Richmond,USA Security
Cross-Platform Network Access Control Paul Watson RVAsec-2013 - Richmond,USA Security
JavaScript Security & HTML5 Mike Shema RVAsec-2013 - Richmond,USA Security
DDoS & Modern Threat Motiv Dan Holden RVAsec-2013 - Richmond,USA Security
Hack Like It’s 2013 Itzik Kotler RVAsec-2013 - Richmond,USA Security
Web Application Vulnerabilities and Solutions Daniel Ramsbrock RVAsec-2013 - Richmond,USA Security
Observations on the (Mostly) Inadvertent Effect of Data Management on International Cybercrime Investigations Donald Allison RVAsec-2013 - Richmond,USA Security
Our Straw House: Vulnerabilities Jericho RVAsec-2013 - Richmond,USA Security
A Day in the Life of an Incident Responder at a Fortune 5 Sean Mason RVAsec-2013 - Richmond,USA Security
Business Adaptation or: How I Learned to Stop Worrying and Love the Internet’s Unclean Conflicts Rockie Brockway RVAsec-2013 - Richmond,USA Security
The State of the Hack Kevin Mandia CISONewYork-2013 - New York,USA Security
The Future of PCI – Securing Payments in a Changing World Bob Russo CISONewYork-2013 - New York,USA Security
Balancing Security Against Corporate Culture Dan Reynolds CISONewYork-2013 - New York,USA Security
Crashdumps: hunt 0days and rootkits Adam Zabrocki Confidence-2013 - Krakow,Poland Security
PHP Object Injection revisted Arseny Reutov Confidence-2013 - Krakow,Poland Security
My Experiments with truth: a different route to bug hunting Devesh Bhatt Confidence-2013 - Krakow,Poland Security
Network Reconnaissance in IPv6 Networks Fernando Gont Confidence-2013 - Krakow,Poland Security
Networking Security Treasures Gawe\xc5\x82 Miko\xc5\x82ajczyk Confidence-2013 - Krakow,Poland Security
Can You Hear Me Now: Leveraging Mobile Devices on Pentests Georgia Weidman Confidence-2013 - Krakow,Poland Security
Podatno?ci aplikacji desktopowych Grzegorz Niemirowski Confidence-2013 - Krakow,Poland Security
Opticode: machine code deobfuscation for malware analysts Nguyen Anh Quynh Confidence-2013 - Krakow,Poland Security
Linux Desktop Insecurity Ilja van Sprudel Confidence-2013 - Krakow,Poland Security
Securing Data in Mobile Application Suites Jesse Burns Confidence-2013 - Krakow,Poland Security
Testy penetracyjne – 7 grzechów g?ównych (Penetration Testing – 7 Deadly Sins) Marek Zmysowski Confidence-2013 - Krakow,Poland Security
LANGSEC 2011-2016 Meredith L. Patterson Confidence-2013 - Krakow,Poland Security
Embedded Devices Hacking Micha Sajdak Confidence-2013 - Krakow,Poland Security
Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel Nikita Tarakanov Confidence-2013 - Krakow,Poland Security
Any Input Is a Program: Weird Machines in ABI and architecture metadata Rebecca bx Shapiro Confidence-2013 - Krakow,Poland Security
The “Facebook PokerAgent” Robert Lipovsky Confidence-2013 - Krakow,Poland Security
TBP Thomas Lim Confidence-2013 - Krakow,Poland Security
Opening Remarks Joe Sylve BSidesNola-2013 - New Orleans,USA Security
Keynote :Securenomics - The Evolving Vulnerability Landscape and its Implications Michael Murray BSidesNola-2013 - New Orleans,USA Security
Week in the Life of a DFIR Elizabeth Schweinsberg BSidesNola-2013 - New Orleans,USA Security
Small Data Forensics--Making Sense of Data Fragments Vassil Roussev BSidesNola-2013 - New Orleans,USA Security
Sex, Drugs and Security Awareness Katrina BSidesNola-2013 - New Orleans,USA Security
Grabbing fresh "evil bits" with Maltrieve Kyle Maxwell BSidesNola-2013 - New Orleans,USA Security
Sick Anti-Analysis Mechanisms in the Wild Alissa Torres BSidesNola-2013 - New Orleans,USA Security
Closing the gap between incidnet handlers and security management Joshua r. Nicholson BSidesNola-2013 - New Orleans,USA Security
Plaso - reinventing the super timeline Kristinn Gudjonsson BSidesNola-2013 - New Orleans,USA Security
Pulling Back the Curtain on Social Enginnering Shannon Sistrunk BSidesNola-2013 - New Orleans,USA Security
Boss Hacking - how I sold your boss Eric Irvin BSidesNola-2013 - New Orleans,USA Security
Leveraging Memory Forensics during DFIR Andrew Case BSidesNola-2013 - New Orleans,USA Security
Are your security devices insecure? Alexander Muentz BSidesNola-2013 - New Orleans,USA Security
Wild vs. Commercial Malware Golden Iii BSidesNola-2013 - New Orleans,USA Security
When Macs Get Hacked Sarah Edwards BSidesNola-2013 - New Orleans,USA Security
DFIR For Beginners @chort0 BSidesNola-2013 - New Orleans,USA Security
Near Space Exploration Arko LayerOne-2013 - Los Angeles, USA Security
Data Evaporation on SSDs (plus DoS) Sam Bowne LayerOne-2013 - Los Angeles, USA Security
Improving Social Engineering Campaigns with Narrative Construction Chris LayerOne-2013 - Los Angeles, USA Security
You have been DDoSed so what? – Two years later Ghostwood LayerOne-2013 - Los Angeles, USA Security
Differential Cryptanalysis for Dummies Jon King LayerOne-2013 - Los Angeles, USA Security
Hardware Reverse Engineering 101 John Norman LayerOne-2013 - Los Angeles, USA Security
Teaching Your WAF New Tricks Robert R LayerOne-2013 - Los Angeles, USA Security
Cognitive Enhancement: Drugs, Electricity and Bullshit Ruphos LayerOne-2013 - Los Angeles, USA Security
The Architects Room: What goes on when Neo isn’t getting lectured Dan Tentler LayerOne-2013 - Los Angeles, USA Security
Compliance Crystal Ball – Future trends in risk-based security framework Erin Jacobs BSidesDenver-2013 - Denver,USA Security
Browser Extension Malware Tim Skorick BSidesDenver-2013 - Denver,USA Security
Peter Schawacker- Agile Security, SOC and how Mortman/Hutton ruined my summer vacation Peter Schawacker BSidesDenver-2013 - Denver,USA Security
Defeating High Security Locks: An Overview Steve Pordon BSidesDenver-2013 - Denver,USA Security
When Does Electronic Espionage Become an 'Act of War' and What Options Do Nations Have to Defend Their Networks? David Willson BSidesDenver-2013 - Denver,USA Security
Keynote: Open Problems in Web and Mobile Privacy Neil Daswani W2SP-2013 - San Francisco,USA Security
Security analysis of the identity federation transaction Apurva Kumar W2SP-2013 - San Francisco,USA Security
Short paper: S-links: Why distributed security policy requires secure introduction Joseph Bonneau W2SP-2013 - San Francisco,USA Security
Keynote: Security and Privacy Challenges in Mobile Augmented Reality David Molnar MOST-2013 - San Francisco,USA Security
Location and Permission Ahmad-reza Sadeghi MOST-2013 - San Francisco,USA Security
Authentication Clinton Gibler MOST-2013 - San Francisco,USA Security
Privacy and Attacks Larry Koved MOST-2013 - San Francisco,USA Security
Leading the Conversation Susan Scott CISOSeattle-2013 - Seattle,USA Security
Strength in Numbers – How Information Sharing and Partnerships Mitigate Security Threats Kelvin Coleman CISOSeattle-2013 - Seattle,USA Security
Blue Collar Change Management Billie Otto CISOSeattle-2013 - Seattle,USA Security
The Race Toward a Social Enterprise Brian Murray CISOSeattle-2013 - Seattle,USA Security
Establishing a Robust Risk Model Gregg Braunton CISOSeattle-2013 - Seattle,USA Security
What to Expect When You’re Implementing ERPs Viji Murali CISOSeattle-2013 - Seattle,USA Security
Focusing on Your Data to Change the Information Security Game Lamont Orange CISOSeattle-2013 - Seattle,USA Security
Cultivating an Empowered Organization Matt Mcilwain CISOSeattle-2013 - Seattle,USA Security
Driving Customer Engagement Through Innovation Kirsten Simonitsch CISOSeattle-2013 - Seattle,USA Security
Gaining Efficiencies Through Server Consolidation Ananthan Thandri CISOSeattle-2013 - Seattle,USA Security
Forensics and eDiscovery – What You Need to Know Jim Steele CISOSeattle-2013 - Seattle,USA Security
Securing Change Call for Volunteers Oliver Day BSidesBoston-2013 - Boston,USA Security
Abusing Exploiting and Pwning with Firefox Add-ons Ajin Abraham HackMiami-2013 - Miami,USA Security
Armitage && Cobalt Strike Penetration Testing Lab Raphael Mudge HackMiami-2013 - Miami,USA Security
An Introduction to Hacking VoIP Dr. Proxy HackMiami-2013 - Miami,USA Security
Big Bang Theory: The Evolution of Pentesting High Security Environment Joe Mccray HackMiami-2013 - Miami,USA Security
Can You Hear Me Now? Leveraging Mobile Devices on Pentests Georgia Weidman HackMiami-2013 - Miami,USA Security
Exploit Development for Mere Mortals Joe Mccray HackMiami-2013 - Miami,USA Security
FAPing with DDoS Rev Helix HackMiami-2013 - Miami,USA Security
Hack and Slash with Pythonect Itzik Kotler HackMiami-2013 - Miami,USA Security
Introduction to HAM Radio Tom Morris HackMiami-2013 - Miami,USA Security
Love letters to Frank Abagnale (How do I p0wn thee let me count the ways) Jason e. Street HackMiami-2013 - Miami,USA Security
Malware Automation Christopher Elisan HackMiami-2013 - Miami,USA Security
Keynote: Malware Trends: Past, Present, and Future Dave Marcus HackMiami-2013 - Miami,USA Security
Perils of Navigating the Net Jay Leiderman HackMiami-2013 - Miami,USA Security
Raising Security Awareness Among Web Owners and Users Emilio Casbas HackMiami-2013 - Miami,USA Security
Things you may not know about Mobile Phones Cheshire Catalyst HackMiami-2013 - Miami,USA Security
The Nexus of Hacktivism, Journalism & the Legal System: In defense of Barrett Brown, Jeremy Hammond, Aaron Swartz, Weev and others @subverzo HackMiami-2013 - Miami,USA Security
Setting up a Tor relay without getting v& David Huerta HackMiami-2013 - Miami,USA Security
IT Consumerization iPading the Enterprise or BYO Malware? Barry Caplin Secure360-2013 - Saint Paul,USA Security
Vendor Information Security and Privacy Management Rebecca Herold Secure360-2013 - Saint Paul,USA Security
Fast Track to Develop or Improve Business & Government Continuity Plans Colonel Smith Secure360-2013 - Saint Paul,USA Security
How to Leverage the CSA GRC Stack Sean Cordero Secure360-2013 - Saint Paul,USA Security
Privacy By the Numbers: How to Measure the Intangible Jay Cline Secure360-2013 - Saint Paul,USA Security
Keynote: Targeting Emerging Cyber Threats Through Information Sharing Ron Plesco Secure360-2013 - Saint Paul,USA Security
Application Layer DDoS: Motives, Mechanism, Relief Ashley Stephenson Secure360-2013 - Saint Paul,USA Security
Backup is good, Recovery is KING! Arlyn Wall Secure360-2013 - Saint Paul,USA Security
Exploit Kits-You don’t need to look for them, they’ll find you. Joel Esler Secure360-2013 - Saint Paul,USA Security
Ideal Distributed Architecture Cindy Burns Secure360-2013 - Saint Paul,USA Security
Manage Your Risk, Not Somebody Else’s Ben Tomhave Secure360-2013 - Saint Paul,USA Security
Security is so yesterday Aaron Wampach Secure360-2013 - Saint Paul,USA Security
Storytelling for Impact David Mann Secure360-2013 - Saint Paul,USA Security
Symantec Internet Security Threat Report Fayyaz Rajpari Secure360-2013 - Saint Paul,USA Security
Weaponized Security Kellman Meghu Secure360-2013 - Saint Paul,USA Security
4140 Ways Your Alarm System Can Fail Babak Javadi Secure360-2013 - Saint Paul,USA Security
Art of War Dana Wolf Secure360-2013 - Saint Paul,USA Security
Comparative Study: Iran, Russia & PRC Cyber War Bill hagestad Ii Secure360-2013 - Saint Paul,USA Security
Emerging Trends in Social Networks Malware Aditya K Sood Secure360-2013 - Saint Paul,USA Security
Ethical Leadership for Security Professionals Chad Weinstein Secure360-2013 - Saint Paul,USA Security
How Bromium Has Re-Invented Endpoint Security Franklyn Jones Secure360-2013 - Saint Paul,USA Security
Lessons from Hurricane Sandy Bryan Strawser Secure360-2013 - Saint Paul,USA Security
Behavioral Threat Modeling John Benninghoff Secure360-2013 - Saint Paul,USA Security
Forensic data analytics on structured data Wendy Predescu Secure360-2013 - Saint Paul,USA Security
Identity Theft Prevention – YOU ARE VULNERABLE! Kelley Archer Secure360-2013 - Saint Paul,USA Security
Lessons Learned from the Financial DDoS Attacks Dan Falkenberg Secure360-2013 - Saint Paul,USA Security
Making Metrics Matter: Connecting Security Metrics to Organizational Objectives Tim Erlin Secure360-2013 - Saint Paul,USA Security
Police and Security Technology Robert Allen Secure360-2013 - Saint Paul,USA Security
Selling BCP to the CFO Jeff Olejnik Secure360-2013 - Saint Paul,USA Security
Lock Picking Demonstration Babak Javadi Secure360-2013 - Saint Paul,USA Security
DataCom Vulnerability and Resiliency Assessment Jeff Daniels Secure360-2013 - Saint Paul,USA Security
Defender or Decoration? Dave Fugleberg Secure360-2013 - Saint Paul,USA Security
Don’t Wait til it’s Too Late! WPV Prevention Daniel Murphy Secure360-2013 - Saint Paul,USA Security
Evolving Enterprise Identity: The Advantages of a Unified Approach Louise Popyk Secure360-2013 - Saint Paul,USA Security
Identity Management and Governance into SAP and ERP Systems Rick Killpack Secure360-2013 - Saint Paul,USA Security
Risk Matters! so Does Trust Bryan k. Fite Secure360-2013 - Saint Paul,USA Security
Security Metaphors Josh More Secure360-2013 - Saint Paul,USA Security
Next-generation Security Solutions for Emerging Threats Dawn Song ASIACCS-2013 - Hangzhou,China Security
The Role and Effectiveness of Cryptography in Network Virtualization Wenbo Mao ASIACCS-2013 - Hangzhou,China Security
An Information-Flow Type-System for Mixed Protocol Secure Computation Florian Kerschbaum ASIACCS-2013 - Hangzhou,China Security
The Economics of Cyber Security Larry Clinton CompForesnicShow-2013 - New york,USA Security
Panel Discussion:How to manage mobile devices in the workplace Richard h.l. Marshall CompForesnicShow-2013 - New york,USA Security
Non-Document Electronic Discovery: Vital Data Unexplored Robert Gezelter CompForesnicShow-2013 - New york,USA Security
Designing e-Discovery for Enterprise-Scale Operations Randy Cochran CompForesnicShow-2013 - New york,USA Security
FLogging: Using Forensic Logging for Real-Time APT Detection Lance James CompForesnicShow-2013 - New york,USA Security
Mobile Biometrics and the Challenge of Attribution Abigail Porter CompForesnicShow-2013 - New york,USA Security
BGP Routing and RPKI Tutorial (Part 2) Carlos Martinez Lacnic19-2013 - Medllin,Colombia Security
A Small Chain of Security Bugs Gone Astray (AKA why XSS can be worse than you think) Hugh Davenport Wahckon-2013 - Perth,Austrailia Security
Team Farmtress 2: Farming for Profit in Valve's War-Themed Hat Simulator Dr greg Baatard Wahckon-2013 - Perth,Austrailia Security
Lockin and Poppin Brian Tisdale Wahckon-2013 - Perth,Austrailia Security
Understanding the Human Body in Order to Break it. An Introduction to Brazilian Jiu-Jitsu Fundamentals. Matt Lambie Wahckon-2013 - Perth,Austrailia Security
Watering Hole Exploitation Jody Melbourne Wahckon-2013 - Perth,Austrailia Security
Privacy & The Big Brothers Chris Hanratty Wahckon-2013 - Perth,Austrailia Security
ICANN & the DNS Root Dave Cake Wahckon-2013 - Perth,Austrailia Security
DIY b0tn3t with a Student Budget Pi3ch Wahckon-2013 - Perth,Austrailia Security
Urban Surveying, Exploring and Adventuring Wez Wahckon-2013 - Perth,Austrailia Security
The Dark Side of Social Media - Dual Use Platforms "dr simon O'rouke" Wahckon-2013 - Perth,Austrailia Security
Phreaking in a post copper world, a discussion on VoIP hacking and fraud. Kai Wahckon-2013 - Perth,Austrailia Security
The Role of Hackers and the Internet in Campaigns for Social Justice and Change Peter Dreisiger Wahckon-2013 - Perth,Austrailia Security
WithIn The Groove: How To Be A Dick To Your Arcade Cameron Ball Wahckon-2013 - Perth,Austrailia Security
Cyberwar and the Real World Sheldon Gill Wahckon-2013 - Perth,Austrailia Security
Talk : Frida IRE – a tool for scriptable dynamic instrumentation in userland Ole Ravn Hackitoergosum-2013 - Paris,Frace Security
Talk : The reality about Red October Paul Rascagneres Hackitoergosum-2013 - Paris,Frace Security
Talk : RFID/NFC security & privacy Philippe Teuwen Hackitoergosum-2013 - Paris,Frace Security
Talk : Defending Critical Infrastructure or Beating the Kobayashi Maru Edmond Rogers Hackitoergosum-2013 - Paris,Frace Security
Talk : HackRF A Low Cost Software Defined Radio Platform Benjamin Vernoux Hackitoergosum-2013 - Paris,Frace Security
Talk : The Machines that Betrayed their Masters: Mobile Device Tracking & Security Concerns Glenn Wilkinson Hackitoergosum-2013 - Paris,Frace Security
Talk : Virtually Secure, Analysis to Remote Root 0day on an Industry Leading SSL-VPN Appliance Tal Zeltzer Hackitoergosum-2013 - Paris,Frace Security
Talk : Paparazzi over IP Daniel Mende Hackitoergosum-2013 - Paris,Frace Security
Talk : Information Warfare: mistakes from the MoDs. Raoul Chiesa Hackitoergosum-2013 - Paris,Frace Security
Talk : Information Retrieval and Machine Learning Tools for Interactive Bug Hunting Fabian Yamaguchi Hackitoergosum-2013 - Paris,Frace Security
Keynote: Rfcat and beyond Adam ( Major Malfunction ) Laurie Hackitoergosum-2013 - Paris,Frace Security
Talk : Hacking apple accessories to pown iDevices – Wake up Neo! Your phone got pwnd ! Mathieu Renard Hackitoergosum-2013 - Paris,Frace Security
Talk : Nifty stuff that you can still do with Android Xavier Martin Hackitoergosum-2013 - Paris,Frace Security
Operating Within the “New Normal” – Managing Cyber Risks Samara Moore CISOHouston-2013 - Houston,USA Security
The CISO's Role in Risk Mitigation Robert Shaffer CISOHouston-2013 - Houston,USA Security
SCADA, DCS and PCN, Oh My: Securing Operational Technology Arthur Conklin CISOHouston-2013 - Houston,USA Security
Using Big Data and Analytics to Think Like an Attacker Ravi Srinivasan CISOHouston-2013 - Houston,USA Security
Information Security as a Business Function Mike Coogan CISOHouston-2013 - Houston,USA Security
The Security Business is Broken: Staying Technical In a Field That Wants To Be Business Only Bill Matthews BSidesChicago-2013 - Chicago, USA Security
New & Local Charles \xe2\x80\x9ctony\xe2\x80\x9d Collins BSidesChicago-2013 - Chicago, USA Security
Advanced Threat Detection and Forensics via NetFlow/IPFXSession Abstract Charles Herring BSidesChicago-2013 - Chicago, USA Security
Teaching the future Information Security Professional Christopher Payne BSidesChicago-2013 - Chicago, USA Security
Entering the infosec industry Eve Adams BSidesChicago-2013 - Chicago, USA Security
Title: Surviving the Robot Apocalypse (software security)Abstract: J wolfgang Goerlich BSidesChicago-2013 - Chicago, USA Security
Weaponized Security Kellman Meghu BSidesChicago-2013 - Chicago, USA Security
Honeypots – “Be vewy, vewy quiet, let’s watch some hackers.. huh-uh-uh-uh-uh-uh-uh-uh” Keith Dixon BSidesChicago-2013 - Chicago, USA Security
OSINT Tools Kyle Maxwell BSidesChicago-2013 - Chicago, USA Security
Security Metrics Marcin Antkiewicz BSidesChicago-2013 - Chicago, USA Security
Title: So I popped the penguin, now what? Mark BSidesChicago-2013 - Chicago, USA Security
If you Open The Terminal, You can Capture The Flag: CTF for Everyone Nicolle ( rogueclown ) Neulist BSidesChicago-2013 - Chicago, USA Security
Creating an Open Source Self Defending Network Steve Mcmaster BSidesChicago-2013 - Chicago, USA Security
Death by Security Controls Todd Haverkos BSidesChicago-2013 - Chicago, USA Security
Forensics for the defense Tom Kopchak BSidesChicago-2013 - Chicago, USA Security
Trust, Security, and Society Bruce Schneier Thotcon-2013 - Chicago,USA Security
Mainframes? What the F&#K is that about? Phil Young Thotcon-2013 - Chicago,USA Security
Runtime Process Insemination Shawn "lattera" Webb Thotcon-2013 - Chicago,USA Security
Automating The Shit Out Of Security David Mortman Thotcon-2013 - Chicago,USA Security
Mesh Stalkings Philip Polstra Thotcon-2013 - Chicago,USA Security
Teaching your WAF new tricks Robert Rowley Thotcon-2013 - Chicago,USA Security
Mobile security, forensics and malware w/ Santoku Andrew Hoog Thotcon-2013 - Chicago,USA Security
Get off your AMF and don’t REST on JSON Dan Kuykendall Thotcon-2013 - Chicago,USA Security
Meshing Stuff Up Josh "m0nk" Thomas Thotcon-2013 - Chicago,USA Security
Creating A Powerful User Defense Against Attackers Ben Ten Thotcon-2013 - Chicago,USA Security
The Message and The Messenger James Arlen Thotcon-2013 - Chicago,USA Security
Attacking Cloud Services w/ Source Code Jonathan Claudius Thotcon-2013 - Chicago,USA Security
Scripting Android Applications Daniel Peck Thotcon-2013 - Chicago,USA Security
Fun with Exploit Kits for Tech Support David healwhans Schwartzberg Thotcon-2013 - Chicago,USA Security
Everything Old is New Again Mike Kemp Thotcon-2013 - Chicago,USA Security
Proactive Defensive Security Prescriptions Anthony Kasza Thotcon-2013 - Chicago,USA Security
Running Security Models w/ SSH Andrew Morris Thotcon-2013 - Chicago,USA Security
Y U NO Sanitize bro? Phreakinggeek Thotcon-2013 - Chicago,USA Security
Hacker Law School Jim Rennie Thotcon-2013 - Chicago,USA Security
Crypto for Hackers Bob Weiss Thotcon-2013 - Chicago,USA Security
Pentesting like a Grandmaster Abraham Aranguren BSidesUK-2013 - London, UK Security
The evolution of Rootkits into the mobile ecosystems Rorie Hood BSidesUK-2013 - London, UK Security
Defense by numbers: Making problems for script kiddies and scanner monkeys. Chris john Riley BSidesUK-2013 - London, UK Security
Make Cyber-Love, not Cyber-war Stephen Bonner BSidesUK-2013 - London, UK Security
32. Pen Test Automation - Helping you get to the pub on time Rory Mccune BSidesUK-2013 - London, UK Security
5. Going Stealth: Staying off the Anti-Virus RADAR. Alex Polychronopoulos BSidesUK-2013 - London, UK Security
The Realex Payments Application Security story, narrated by Security Ninja. David Rook BSidesUK-2013 - London, UK Security
How to build a personal security brand that will stop the hackers, save the world and get you the girl Javvad Malik BSidesUK-2013 - London, UK Security
HTML5: attack and defense Ksenia Dmitrieva BSidesUK-2013 - London, UK Security
Playing CTFs for fun & profit Tim P BSidesUK-2013 - London, UK Security
I'm the the guy your CSO is STILL warning you about! "gavin 'jac0byterebel' Ewan" BSidesUK-2013 - London, UK Security
Dissecting Targeted Attacks - Separating Myths from Facts. Candid Wüest BSidesUK-2013 - London, UK Security
Why Pentesting Sucks Cory Marchand BSidesUK-2013 - London, UK Security
External Assessments Owen Bellis BSidesUK-2013 - London, UK Security
Talking in a foreign land Anne Wood BSidesUK-2013 - London, UK Security
Approaching Cipher Puzzles: Fun for all the snzvyl Channon Powell BSidesUK-2013 - London, UK Security
Continuous security integration Artjom Vassiljev BSidesUK-2013 - London, UK Security
Cyber Warfare Operations, Impact Assessments, Delphi Oracles, predictions & other funky stuff... (working title) Konstantinia Charitoudi BSidesUK-2013 - London, UK Security
Real-Time Static Analysis in Eclipse Diarmaid Mcmanus BSidesUK-2013 - London, UK Security
ICMP - The proxy your admin hates to block Ryan Ward BSidesUK-2013 - London, UK Security
Web Application Vulnerabilities overview Jamie Shaw BSidesUK-2013 - London, UK Security
Exploiting Windows Deployment Services Ben Campbell BSidesUK-2013 - London, UK Security
Incident response trends Justin greenwood Delgado BSidesUK-2013 - London, UK Security
Scanning without nmap Isabel Forkin BSidesUK-2013 - London, UK Security
Android Exploits Damien King BSidesUK-2013 - London, UK Security
Security Awareness: Making Your Staff the STRONGEST link Mo Amin BSidesUK-2013 - London, UK Security
Economics of Security Leron Zinatullin BSidesUK-2013 - London, UK Security
NOSQL & Big Data - A way to lose even more stuff Gavin Holt BSidesUK-2013 - London, UK Security
The upside-down-ternet Gordon Gray BSidesUK-2013 - London, UK Security
AppSec: Where the Human Wins Dennis Antunes BSidesUK-2013 - London, UK Security
Snapshots of the Brazilian Cybercrime Landscape Berta Papp BSidesUK-2013 - London, UK Security
Android Forensics Nikhalesh sing Bhadoria DefconKerala-2013 - Kerala, India Security
Break sqlmap into pieces Oltjano DefconKerala-2013 - Kerala, India Security
Expendables of phishing Archith Kp DefconKerala-2013 - Kerala, India Security
Real world techniques and Firewall evasion in SQLi Francis Alexander DefconKerala-2013 - Kerala, India Security
IronWASP the open source web security testing platform Lavakumar Kuppan DefconKerala-2013 - Kerala, India Security
Skanda Cross Site port attacker Jayesh singh Chauhan DefconKerala-2013 - Kerala, India Security
Pwning the Air!! Saravanan DefconKerala-2013 - Kerala, India Security
Social Engineering Art of human brain manipulation Muhammed Shereef DefconKerala-2013 - Kerala, India Security
LTE boom in vulnerabilities Ankit Gupta DefconKerala-2013 - Kerala, India Security
TOR based botnets N suriya Prakash DefconKerala-2013 - Kerala, India Security
Remote denial of service in Android devices Yashin Mehaboobe DefconKerala-2013 - Kerala, India Security
.NET Reverse Engineering Tips and Rum Drinking Aloria BeaCon-2013 - Boston, USA Security
Why UPnP is Awesome and Terrifying Dan Crowley BeaCon-2013 - Boston, USA Security
Malformity Keith Gilbert BeaCon-2013 - Boston, USA Security
Pharmaspam at a .edu: A Case Study Patrick Laverty BeaCon-2013 - Boston, USA Security
Blitzing With Your Defense Ben Jackson BeaCon-2013 - Boston, USA Security
Digital Bounty Hunters: Decoding Bug Bounty Programs Jon Rose BeaCon-2013 - Boston, USA Security
Cyber Pompeii 3: Tokyo Drift Dan Rosenberg BeaCon-2013 - Boston, USA Security
Keynote Dan Guido InfoSec SouthWest-2013 - Austin,USA Security
All the network is a stage, and the APKs merely players: Scripting Android Applications Daniel Peck InfoSec SouthWest-2013 - Austin,USA Security
Anatomy of a Chinese Infiltration into a Research EDU Joshua "kernelsmith" Smith InfoSec SouthWest-2013 - Austin,USA Security
Cracking Corporate Passwords - Why Your Password Policy Sucks Rick Redman InfoSec SouthWest-2013 - Austin,USA Security
Defending the City Within the City Ut Office InfoSec SouthWest-2013 - Austin,USA Security
Destructive D-Trace - With Great Power Comes Great Responsibility Neil "nemo" Archibald InfoSec SouthWest-2013 - Austin,USA Security
Ghetto VR: steps involved in vulnerability research Mirek Bartik InfoSec SouthWest-2013 - Austin,USA Security
Taint Nobody Got Time for Crash Analysis Richard Johnson InfoSec SouthWest-2013 - Austin,USA Security
The 24 Hour Pentest Marcus j. Carey InfoSec SouthWest-2013 - Austin,USA Security
Music Composing workshops CartRAGE Andarugo Notacon-2013 - Cleveland,USA Security
NETICONES Michael Borras Notacon-2013 - Cleveland,USA Security
Glitch / Artware Artists Talks with ../n!ck (AKA Nick Briz) Nick Briz Notacon-2013 - Cleveland,USA Security
Hacking Your Ability to Communicate Kadiera Notacon-2013 - Cleveland,USA Security
Little Hackers Playdate Kadiera Notacon-2013 - Cleveland,USA Security
Glitch in the Hacker context Joncates Notacon-2013 - Cleveland,USA Security
D1THER_DØØM D1ther Notacon-2013 - Cleveland,USA Security
Lasers for Fun! Lasers for Science. Lasers for Security! Ethan Dicks Notacon-2013 - Cleveland,USA Security
Bad Games Arcade Jake Elliott Notacon-2013 - Cleveland,USA Security
I Forked the Law and We All Won Fork the Law Notacon-2013 - Cleveland,USA Security
Let’s Go CSRF’n Now! Grap3_ap3 Notacon-2013 - Cleveland,USA Security
You Keep A-Knockin’ But You Can’t Come In Grap3_ap3 Notacon-2013 - Cleveland,USA Security
Corrupt.epub Benjamin Gaulon Notacon-2013 - Cleveland,USA Security
Learn About the Notacon Badge Seth Hardy Notacon-2013 - Cleveland,USA Security
Critical Making Garnet Hertz Notacon-2013 - Cleveland,USA Security
Make Me Babyproof! Gina Hoang Notacon-2013 - Cleveland,USA Security
Building the Blorgan and Beating the Blahs Inspired Chaos Notacon-2013 - Cleveland,USA Security
Brain: You’re Doing It Wrong Paul Jarc Notacon-2013 - Cleveland,USA Security
meta meta: ninja turtles all the ways Ben Kelley Notacon-2013 - Cleveland,USA Security
Are we getting better? – Hacking Todays Technology Dave Kennedy Notacon-2013 - Cleveland,USA Security
Glitched Imperfections Holly Lay Notacon-2013 - Cleveland,USA Security
Admiring one of IBM’s biggest mistakes: The PCjr Jim Leonard Notacon-2013 - Cleveland,USA Security
Do Something, Even If It’s Wrong Patrick Lichty Notacon-2013 - Cleveland,USA Security
ChaosVPN – a network to connect hackers Mc.fly Notacon-2013 - Cleveland,USA Security
DIY Neuroscience, EMGs, EEGs, and other recordings Meecie Notacon-2013 - Cleveland,USA Security
Whose Slide is it Anyway? Nicolle ( rogueclown ) Neulist Notacon-2013 - Cleveland,USA Security
Algorithmic Composition of Acid House with Lo-Fi Timbres Scott Nordlund Notacon-2013 - Cleveland,USA Security
Skeleton Key: Transforming Medical Discussions Through 3D Printing. Kk Pandya Notacon-2013 - Cleveland,USA Security
DC to Daylight: A whirlwind tour of the radio spectrum, and why it matters. Stormgren Notacon-2013 - Cleveland,USA Security
End-Times Aware Art Alfredo Salazar-caro Notacon-2013 - Cleveland,USA Security
The Maru Architecture Design: A proposed BYOD architecture for an evolving threat landscape Michael Smith Notacon-2013 - Cleveland,USA Security
How I Became an iOS Developer for Fun and Debt Mark Stanislav Notacon-2013 - Cleveland,USA Security
Glitch Textiles Phillip Stearns Notacon-2013 - Cleveland,USA Security
Encryption for Everyone Dru Streicher Notacon-2013 - Cleveland,USA Security
Gameboy Hacking workshops Thursday Customs Notacon-2013 - Cleveland,USA Security
megatsunami Tonylight Notacon-2013 - Cleveland,USA Security
Esolangs Daniel Temkin Notacon-2013 - Cleveland,USA Security
Video Everywhere! aka The Personal Distributed HD Video Network Woz Notacon-2013 - Cleveland,USA Security
Keynote 1:The Internet is Insecure and Will Likely Remain So - Now What? Henning Schulzrinne WiSec-2013 - Budapest,Hungary Security
Session 1: Mobile Device and Application Security Ahmad-reza Sadeghi WiSec-2013 - Budapest,Hungary Security
Session 2: Physical Layer Attacks and Defenses Ivan Martinovic WiSec-2013 - Budapest,Hungary Security
Mobile Threats to Privacy Ashkan Soltani WiSec-2013 - Budapest,Hungary Security
Session 3: Wireless Protocol Security Ming Li WiSec-2013 - Budapest,Hungary Security
ETA: Efficient and Tiny and Authentication for Heterogeneous Wireless Systems Attila a. Yavuz WiSec-2013 - Budapest,Hungary Security
Keynote 2:How do you define Security and Privacy for Smart Metering in Europe today? Michael John WiSec-2013 - Budapest,Hungary Security
Session 4: Privacy in Wireless Systems Marco Gruteser WiSec-2013 - Budapest,Hungary Security
Session 5: Design and Testing of Secure Protocols Levente Buttyan WiSec-2013 - Budapest,Hungary Security
Session 6: Establishing Keys, Trust, and Identity Frank Kargl WiSec-2013 - Budapest,Hungary Security
Session 7: Energy and Distance Bounding Mark Felegyhazi WiSec-2013 - Budapest,Hungary Security
HotWiSec Session 1: Attack Execution and Detection Murtuza Jadliwala WiSec-2013 - Budapest,Hungary Security
HotWiSec Session 2: Secure and Privacy-Preserving Communication Levente Buttyan WiSec-2013 - Budapest,Hungary Security
HotWiSec Session 3: Authentication and Key Exchange Murtuza Jadliwala WiSec-2013 - Budapest,Hungary Security
Theory and Application of Realistic Capture the Flag Competitions Julian Cohen SourceBoston-2013 - Boston,USA Security
"Hacking Back" is a Bad Idea Steven Maske SourceBoston-2013 - Boston,USA Security
Suicide Risk Assessment and Intervention Tactics Amber Baldet SourceBoston-2013 - Boston,USA Security
I Built My House On Sand - Embedded Security at the Firmware Layer Ryan Permeh SourceBoston-2013 - Boston,USA Security
Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World Ed Skoudis SourceBoston-2013 - Boston,USA Security
"Cyber" Momentum: Understanding & Leveraging the National Cybersecurity Policy Debate Jack Whitsitt SourceBoston-2013 - Boston,USA Security
Pwnie Express presents Practical MitM Pentesting Jonathan Cran SourceBoston-2013 - Boston,USA Security
Insider Threat: Hunting for Authorized Evil Tom ( Decius ) Cross SourceBoston-2013 - Boston,USA Security
An Examination of String Allocations in Internet Explorer 9 Christopher Valasek SourceBoston-2013 - Boston,USA Security
A Brief History of Physical Security Schuyler Towne SourceBoston-2013 - Boston,USA Security
Hiring/Recruitment Lee Kushner SourceBoston-2013 - Boston,USA Security
Speed Networking Jonathan Cran SourceBoston-2013 - Boston,USA Security
Keynote Gene H. Kim SourceBoston-2013 - Boston,USA Security
Data & Design: Visualizing InfoSec Joshua du Lac BsideSOrlando-2013 - Orlanado, USA Security
Intro to Lock Picking Jess Hires BsideSOrlando-2013 - Orlanado, USA Security
RFID Credentials or (Cyber Pearl 9/11 Harbor of DOOM) Mudsplatter Thegreat BsideSOrlando-2013 - Orlanado, USA Security
Intro to CTFs Jordan Wiens BsideSOrlando-2013 - Orlanado, USA Security
Shodan Shawn Merdinger BsideSOrlando-2013 - Orlanado, USA Security
The Barrier to Entry for AppSec Kyle Rippee BsideSOrlando-2013 - Orlanado, USA Security
Hacking Like It's 1999: Security Flaws We All Know And Love Joey Belans BsideSOrlando-2013 - Orlanado, USA Security
Getting out of the tactical trees and into the strategic forest Eric Irvin BsideSOrlando-2013 - Orlanado, USA Security
Breaking into InfoSec Jess Hires BsideSOrlando-2013 - Orlanado, USA Security
Android Malware Grows Up Tim Armstrong BsideSOrlando-2013 - Orlanado, USA Security
Jurassic Jar: Their World. Our Rules. Esteban Guillardoy Infiltrate-2013 - Miami, USA Security
Attacking the next generation air traffic control system Brad "Renderman" Haines Infiltrate-2013 - Miami, USA Security
Hack Back - Active Defense in Cyberspace Greg Hoglund Infiltrate-2013 - Miami, USA Security
Enterprise Malware, There is Always a Way. (DNS/DNSSEC) Alberto garcia Illera Infiltrate-2013 - Miami, USA Security
Advanced Heap Manipulation in Windows 8 Zhenhua (eric) Liu Infiltrate-2013 - Miami, USA Security
The Chameleon: A cellphone-based USB impersonator Matias Soler Infiltrate-2013 - Miami, USA Security
NAND-Xplore -> Bad Blocks = Well Hidden Josh "m0nk" Thomas Infiltrate-2013 - Miami, USA Security
Exfiltrate: Efficient Blind SQLi Miguel Turner Infiltrate-2013 - Miami, USA Security
Can you hear me now? Leveraging Mobile Devices on Penetration Tests Georgia Weidman Hackcon-2013 - Oslo, Norway Security
All Your Faces Are Belong to Us --Breaking Facebook's Social Authentication Stefano Zanero Hackcon-2013 - Oslo, Norway Security
Mastering Master-Keyed Systems Deviant Hackcon-2013 - Oslo, Norway Security
Death By Pixels Samuil Shah Hackcon-2013 - Oslo, Norway Security
Dirty Little Secrets Part 2 Rob Fuller Hackcon-2013 - Oslo, Norway Security
Social-Engineering: Not your average cup of Joe Dave Kennedy Hackcon-2013 - Oslo, Norway Security
Penetration testing from a Hot Tub Time Machine Eric Smith Hackcon-2013 - Oslo, Norway Security
Cut the crap; let's create a Phishing and Trojan attack. Dave Chronister Hackcon-2013 - Oslo, Norway Security
Search Engine Poisoning (SEP) Attacks Chris Larsen Hackcon-2013 - Oslo, Norway Security
Moloch - your friend in the Dark Moloch Hackcon-2013 - Oslo, Norway Security
Want to control smart phones? Hemil Shah Hackcon-2013 - Oslo, Norway Security
KEYNOTE 1: Embracing the Uncertainty of Advanced Hacks with Big Data Analytics Edward J. Schwartz HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Papparazi Over IP Daniel Mende HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Windows x64: The Essentials Didier Stevens HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Orchestrating a Fire Sale: Bringing Dutch Alarm Systems to Their Knees Wilco baan Hofman HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Nifty Tricks and Sage Advice for Shellcode on Embedded Systems Travis Goodspeed HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Exploiting Hardcore Pool Corruptions in Microsoft Windows Kernel Nikita Tarakanov HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Defeating the Intercepting Web Proxy – A Glimpse Into the Next Generation of Web Security Tools Petko ( pdp ) D. Petkov HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Virtually Secure: Analysis to Remote Root 0day in an Industry Leading SSL-VPN Appliance Tal Zeltzer HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
LTE Pwnage: Hacking HLR/HSS and MME Core Network Elements Philippe Langlois HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Hack Like it’s 2013 Itzik Kotler HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Abusing Twitter’s API and OAuth Implementation Nicolas Seriot HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Abusing Browser User Interfaces for Fun and Profit Rosario Valotta HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Attacking Ruby on Rails Applications Joernchen ( joernchen ) HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Who Can Hack a Plug? The Infosec Risks of Charging Electric Cars Ofer Shezaf HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Secure Coding: Web & Mobile Jim Manico HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
iNalyzer: No More Blackbox iOS Analysis Chilik Tamir HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Dreamboot: A UEFI Bootkit Sebastien Kaczmarek HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
System Shock: The Shodan Computer Search Engine Dan Tentler HITBSecConf Amsterdam-2013 - Amsterdam, Netherlands Security
Keynote Rafal wh1t3rabbit Los BSidesIowa-2013 - Iowa, USA Security
Evolutionary Security – Embracing Failure to Attain “Good Enough” Josh More BSidesIowa-2013 - Iowa, USA Security
Campus RFID Hacks Ud Students BSidesIowa-2013 - Iowa, USA Security
DFIR: Taming the Enterprise Ben Johnson BSidesIowa-2013 - Iowa, USA Security
Don’t Call It a Load Balancer – Using Modern Applicatio Delivery Controllers to Improve Website Security Jason Braddy BSidesIowa-2013 - Iowa, USA Security
Building Effective Security Teams – A leader and worker perspective Dave Nelson BSidesIowa-2013 - Iowa, USA Security
Applied Procurement Triage Mike Ahrendt BSidesIowa-2013 - Iowa, USA Security
Opening Up on Financial Exchange: Breaking the OFX Protocol Tony Collins BSidesIowa-2013 - Iowa, USA Security
OWASP Top 10 through IronBee rules Marcin Antkiewicz BSidesIowa-2013 - Iowa, USA Security
Dynamic Linux Firewalls using IPSet Chris Cooper BSidesIowa-2013 - Iowa, USA Security
Payload Analysis- Triage, Detect and Response Kyle Oetken BSidesIowa-2013 - Iowa, USA Security
I\m Good Enough, I’m Smart Enough and Doggone It, CFP Reviewers and Audiences CAN Love Me! James Arlen BSidesROC-2013 - Rochester,USA Security
Building the Perfect Backdoor Tyler Wrightson BSidesROC-2013 - Rochester,USA Security
Attacking NFC Mobile Wallets: Why I’d Rather Swipe Your Credit Card Max Sobell BSidesROC-2013 - Rochester,USA Security
Simplifying Secure Code Reviews Sherif Koussa BSidesROC-2013 - Rochester,USA Security
Controlling a Smartphone from an Architectural Vantage Point Kirk Swidowski BSidesROC-2013 - Rochester,USA Security
Mobile Phone Hacking (+/- 5 years) Corey Benninger BSidesROC-2013 - Rochester,USA Security
Custom Power Pwn James Edge BSidesROC-2013 - Rochester,USA Security
Owning Computer Systems Royce Davis BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
APN functions for e-commerce security Moises Delgado BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
Forensic Analysis on iOS Devices Jaime a. Restrepo-gomez BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
WebSockets unPlugged Vaagn Toukharian BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
Resurrecting Ettercap: Past, Present and Future of Malicious Routing Emilio Escobar BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
Overcoming Objections to Security in the SDLC with a Special Section on Weaponizing QA Test Scripts Michael Landeck BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
Keynote: Security Rant Carlos Perez BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
Don’t be Fooled, Scanning Web Applications is not Pen-Testing Jose Hernandez BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
Love letters to Frank Abagnale Jayson E. Street BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
Pentesting in the POST-PC era Jaime a. Restrepo-gomez BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
Addition by Subtraction: How Networked Appliances Affect your Security Posture Chris Campbell BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
Practical Persistence With PowerShell Matt Graeber BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
The Anomaly of when a vulnerability assessment is better than a pentest. Albert Campa BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
Powershell for Security Professionals Carlos Perez BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
Armitage and Cobalt Strike Penetration Testing Lab Raphael Mudge BSidesPuertoRico-2013 - San Juan,Puerto Rico Security
Impersonating CAPTCHA Providers Gursev Singh Kalra Outerz0ne-2013 - Georgia, USA Security
State of the BitCoin Address; Pizza, Pirates, and Profiteers. Tuttle/brimstone Outerz0ne-2013 - Georgia, USA Security
Geeks Guide to a Healthy Lifestyle Halfjack Outerz0ne-2013 - Georgia, USA Security
Hacking the Atom Chad Ramey Outerz0ne-2013 - Georgia, USA Security
Weapons of Miniature Destruction Chris Silvers Outerz0ne-2013 - Georgia, USA Security
Hummingbird: A Rotor Machine for the 21st Century Whitfield Diffe CS040SecConFab-2013 - California,USA Security
Securing the Stock Markets Sonia Chiasson Financial Cryptography and Data Security-2013 - Bonaire,Netherlands Security
Security Audits Revisited Rainer Boehme Financial Cryptography and Data Security-2013 - Bonaire,Netherlands Security
Dynamic Accumulator based Discretionary Access Control for Outsourced Storage with Unlinkable Access (Short Paper) Daniel Slamanig Financial Cryptography and Data Security-2013 - Bonaire,Netherlands Security
Big Data Era: customer intelligence helps to boost your email marketing Steven Ledgerwood CARTESAsia-2013 - Hong Kong,China Security
Mobile Wallets: More than an App, for more than just Payments Shubhrendu Khoche CARTESAsia-2013 - Hong Kong,China Security
All-in-One NFC SIM is a Perfect Combination of Contactless Technology and Mobile Financial Services Liu feng - CARTESAsia-2013 - Hong Kong,China Security
Getting the right way to the synergy of multiple sales channels from both online and offline Franklin Yao CARTESAsia-2013 - Hong Kong,China Security
Social Media Marketing 2013: What Businesses Need To Know Magic Zhang CARTESAsia-2013 - Hong Kong,China Security
Digital Marketing Best Practices: The Innovative Consumer Engagement Approach Vivian Lam CARTESAsia-2013 - Hong Kong,China Security
Enhance Consumer Loyalty Through the Multi-Channel Experiences Ella Bee CARTESAsia-2013 - Hong Kong,China Security
Essential strategies for measuring marketing effectiveness across channels Angie Ko CARTESAsia-2013 - Hong Kong,China Security
Make your Data Strategy Right in the Digital Ecosystem to tell a Complete Data Story Charlie Wang CARTESAsia-2013 - Hong Kong,China Security
How The Era Of ‘Big-Data’ Is Changing The Practice Of Online Marketing Lisa Watson CARTESAsia-2013 - Hong Kong,China Security
Optimize your lead generation through integrated marketing campaigns Kenneth Kwok CARTESAsia-2013 - Hong Kong,China Security
Why eCommerce advertising should not be an after-thought in China? Philip Beck CARTESAsia-2013 - Hong Kong,China Security
From Email Marketing to Marketing Automation Alan Wo CARTESAsia-2013 - Hong Kong,China Security
The review and forecasting of E-commerce business in mature and emerging markets across Asia region Ashok Sethi CARTESAsia-2013 - Hong Kong,China Security
Driving the evolution and growth of E-commerce across international markets Noah Herschman CARTESAsia-2013 - Hong Kong,China Security
Rapidly and vigorously developing E-commerce market in China Yong Zhang CARTESAsia-2013 - Hong Kong,China Security
Empower business, society and country with E-commerce in Thailand Pawoot Pongvitayapanu CARTESAsia-2013 - Hong Kong,China Security
Examining the development of online shopping in Asia and what opportunities it will create for retailers James Mckeogh CARTESAsia-2013 - Hong Kong,China Security
Growing eCommerce by Thinking Digital Commerce Daniel Chan CARTESAsia-2013 - Hong Kong,China Security
Innovation in the cross-border e-commerce supply chain with sustainable solutions for logistic barriers Marnix Bakker CARTESAsia-2013 - Hong Kong,China Security
Finding the best strategy for small medium size company to expand revenue "stephane Prud'homme , " CARTESAsia-2013 - Hong Kong,China Security
Discover how to launch and grow a successful ecommerce business company Jennifer Cheng CARTESAsia-2013 - Hong Kong,China Security
Discover how to transform traditional business company into a successful ecommerce business company Tim Verouden CARTESAsia-2013 - Hong Kong,China Security
Own your Future! What you can do to secure your Place in a Rapidly changing Transaction Environment Scott Magnacca CARTESAsia-2013 - Hong Kong,China Security
Easing an Issuer's Journey into Mobile: the Aggregator TSM Approach Nigel Beatty CARTESAsia-2013 - Hong Kong,China Security
Review on the Deployment of NFC Wallet in Poland Laurent Renard CARTESAsia-2013 - Hong Kong,China Security
The Dongle Book: a panorama of mPOS players Bruno Moreau CARTESAsia-2013 - Hong Kong,China Security
Financial Instant Issuing Strategy with Mobile Solutions Rusty Carpenter CARTESAsia-2013 - Hong Kong,China Security
Security and Trust for the NFC Mobile Payment in APAC Toru Hashimoto , Boutheina Chetali CARTESAsia-2013 - Hong Kong,China Security
PCI DSS, Account Data, and Non-proliferation Jim Yip CARTESAsia-2013 - Hong Kong,China Security
Elevating Emerging Economies by setting up Contactless based Infrastructure – The Sri Lankan Story so far Patrick Henzen CARTESAsia-2013 - Hong Kong,China Security
Developing a Privacy Framework for Government Markets Kevin Gillick CARTESAsia-2013 - Hong Kong,China Security
Advanced Government ID Credentials Craig Sandness CARTESAsia-2013 - Hong Kong,China Security
National eID and Passport - Can Standards make the Difference? Dan Butnaru CARTESAsia-2013 - Hong Kong,China Security
When ease of Authentication and Resistance to Counterfeiting are uncompromised Corinne murcia Giudicelli CARTESAsia-2013 - Hong Kong,China Security
Cloud Content, Digital ID and Real-time Global Access: Opportunity or Nightmare? Sebastien Taveau CARTESAsia-2013 - Hong Kong,China Security
Key Success Factors in implementing National Payment Card Standards Barry Meiklejohn CARTESAsia-2013 - Hong Kong,China Security
Transforming the Moment of Payment into a Moment of Interaction Philippe David CARTESAsia-2013 - Hong Kong,China Security
An Innovative mPOS Solution for Micro Payments at Merchants, Self-Service Kiosks and on the Internet using LGM Card, the Mass Market Secure NFC microSD Card David a. Riffelmacher CARTESAsia-2013 - Hong Kong,China Security
The POS uptake in a Cash based Society Mohsen Yousefpour CARTESAsia-2013 - Hong Kong,China Security
Loyalty and Gift Card Program Innovations Clayton Gray CARTESAsia-2013 - Hong Kong,China Security
How a Kiosk can help Prepaid Issuers to tap Prepaid Opportunity? Antoine Groine CARTESAsia-2013 - Hong Kong,China Security
On-Demand Application Issuing as a Service Nigel Beatty CARTESAsia-2013 - Hong Kong,China Security
Nano-SIM adopted. Embedded SIM announced. What's next for SIM Integration in Mobile Handsets? Thierry Spanjaard CARTESAsia-2013 - Hong Kong,China Security
Dawn of Digital Security in Smartcard Technologies Eric Seow , Marcus Janke CARTESAsia-2013 - Hong Kong,China Security
The Next Generation of Smart Cards Lionel Baraban CARTESAsia-2013 - Hong Kong,China Security
Conquering the End Consumer Market with Approaches beyond Payment Joerg Schmidt CARTESAsia-2013 - Hong Kong,China Security
Beyond Payment - NFC in Industrial Applications Reinhard Kalla CARTESAsia-2013 - Hong Kong,China Security
Java Card 3 for Mobile Financial Services Bruno Basquin CARTESAsia-2013 - Hong Kong,China Security
The "Touch" Benefit that Sony proposes for Our Daily Life Masayuki Takezawa CARTESAsia-2013 - Hong Kong,China Security
Leading Specification to build up Smart Ticketing Schemes for Modern Transport Systems Ralph Gambetta CARTESAsia-2013 - Hong Kong,China Security
Regional Transportation Schemes in APAC Gunther Lackner CARTESAsia-2013 - Hong Kong,China Security
NFC, just a Payment Tool? Gilbert Leung CARTESAsia-2013 - Hong Kong,China Security
Mobile Identity on Secure Elements Raymond Ng CARTESAsia-2013 - Hong Kong,China Security
Turning Point for the Security of the Mobile Payment Christian Damour CARTESAsia-2013 - Hong Kong,China Security
Mobile Payment Security and Compliance Andrew Jamieson CARTESAsia-2013 - Hong Kong,China Security
Driving Mobile Security Standards and Solutions Kevin Gillick CARTESAsia-2013 - Hong Kong,China Security
Mobile Security Protection for Mobile Wallets, Mobile Financial Services, HD Video Content Protection of DRM Karl Weaver CARTESAsia-2013 - Hong Kong,China Security
Java Solutions for Securing Edge to Enterprise Florian Tournier CARTESAsia-2013 - Hong Kong,China Security
BYOD: The Secure Transactions Industry brings Solutions! Artur Khakimov CARTESAsia-2013 - Hong Kong,China Security
Standardizing the Internet Protocol Landscape Kevin Gillick CARTESAsia-2013 - Hong Kong,China Security
TSM offers an Open, Secure and Reliable Channel for Communication between MNOs, Mobile Payment Issuers and End Users Qin Hui CARTESAsia-2013 - Hong Kong,China Security
Building a Vibrant NFC Ecosystem for Payment Service Providers (PSPs) Cyril Vuillemin CARTESAsia-2013 - Hong Kong,China Security
USSD in Payments, Retail and Aid Mohsen Yousefpour CARTESAsia-2013 - Hong Kong,China Security
PayOn Payment in Financial Surroundings Ki-ho Byeon CARTESAsia-2013 - Hong Kong,China Security
Mobile Banking Solutions allow Network Operators and Financial Institutions to offer Customers the Freedom to manage their Money whenever and wherever they want Qin Hui CARTESAsia-2013 - Hong Kong,China Security
Preparation for Mobile Devices Adoption Lincoln Tang CARTESAsia-2013 - Hong Kong,China Security
Integrated Trusteeship Service of Financial IC Card and Mobile Payment Card Issuing Xing Zhang CARTESAsia-2013 - Hong Kong,China Security
Leveraging the revenue growth with successfully developing your own direct online business Ramzi Chaabane CARTESAsia-2013 - Hong Kong,China Security
Assessing innovative E-commerce campaign for the best ROI Marc de Lange CARTESAsia-2013 - Hong Kong,China Security
Systematic approach to analyse your e-commerce data and improve eCommerce business performance Charles Chan CARTESAsia-2013 - Hong Kong,China Security
Will the OTO (online to offline) become the next gold mountain? Lisa Watson CARTESAsia-2013 - Hong Kong,China Security
Successfully leveraging mobile commerce to connect and build impulse for your business Leo Ku CARTESAsia-2013 - Hong Kong,China Security
Building your business through social commerce - travel case study Marc Ardisson CARTESAsia-2013 - Hong Kong,China Security
Best innovative E-commerce practice from brand owners - Travel industry Sean Seah CARTESAsia-2013 - Hong Kong,China Security
Best innovative E-commerce practice from brand owners - Digital products industry David Lee CARTESAsia-2013 - Hong Kong,China Security
How Brands are Empowering Mobile Consumer Engagement Globally and Locally Daniel Chan CARTESAsia-2013 - Hong Kong,China Security
Social Media ROI: Managing and Measuring Social Media Efforts Henry Wood CARTESAsia-2013 - Hong Kong,China Security
The Impact of Social Media on SEO in an Ever Changing Online Marketing World Allen Qu CARTESAsia-2013 - Hong Kong,China Security
Tutorials Gary Mcgraw AsiaARES-2013 - Indonesia,Yogyakarta Security
Tutorial on DNS Security (>>Abstract<<) Haya Shulman AsiaARES-2013 - Indonesia,Yogyakarta Security
Lessons Of Static Binary Analysis Christien ( Dildog ) Rioux SOURCEDublin-2013 - Dublin,Ireland Security
Hacking Appliances: Ironic exploits in security products Ben SOURCEDublin-2013 - Dublin,Ireland Security
Keynote Riley caezar Eller CactusCon-2013 - Arizona, USA Security
Break Glass In Case Of Killed Comms Drew \xe2\x80\x9credshift\xe2\x80\x9d Porter CactusCon-2013 - Arizona, USA Security
Cracking Password Safes Joseph Giron CactusCon-2013 - Arizona, USA Security
Detect and Contain: Combating Account Takeover Robert E. Lee CactusCon-2013 - Arizona, USA Security
DNS May Be Hazardous to Your Health Robert Stucke CactusCon-2013 - Arizona, USA Security
Doing it Wrong with Scalpel Eric Davisson CactusCon-2013 - Arizona, USA Security
Fire and Forget Password Cracking Joe Demesy CactusCon-2013 - Arizona, USA Security
I just got the test results back, it is definitely Scapy Kevin Tyers CactusCon-2013 - Arizona, USA Security
IACS Security Donovan Tindill CactusCon-2013 - Arizona, USA Security
JavaScript: Pretty cool guy and doesn't afraid of anything Evan "treefort" Booth CactusCon-2013 - Arizona, USA Security
Your printer is why you got owned Samuel Shapiro BSidesAustin-2013 - Austin, USA Security
Social Engineering Contest Kickoff Aaron Crawford BSidesAustin-2013 - Austin, USA Security
Online social networks: new heaven for spammers and attackers Dr jason Ding BSidesAustin-2013 - Austin, USA Security
Using Social Engineering Tactics to Game Big Data Branden R. Williams BSidesAustin-2013 - Austin, USA Security
Training - Developing Secure Mobile Applications Dan Cornell BSidesAustin-2013 - Austin, USA Security
Letters to Frank Abagnale (How do I pwn thee let me count the ways) Jayson E. Street BSidesAustin-2013 - Austin, USA Security
Threat Modeling Like a Boss! Marcus Carey BSidesAustin-2013 - Austin, USA Security
Malware Automation Christopher Elisan BSidesAustin-2013 - Austin, USA Security
Mainframes: Everybody has one but nobody knows how to hack them! Phil Young BSidesAustin-2013 - Austin, USA Security
Social Engineering Contest Wrapup Aaron Barrell BSidesAustin-2013 - Austin, USA Security
You’ve been breached, now what? David Balcar BSidesAustin-2013 - Austin, USA Security
Security Imperatives for iOS & Android Apps Kartik Trivedi BSidesAustin-2013 - Austin, USA Security
Implementation Patterns For Software Security Programs Dan Cornell BSidesAustin-2013 - Austin, USA Security
Cloudifying Key Management' Jarret Raim BSidesAustin-2013 - Austin, USA Security
Convincing Your Management, Your Peers, and Yourself that Risk Josh Sokol BSidesAustin-2013 - Austin, USA Security
Effectively Leading Your Team in Times of Uncertainty and Change Jason Anthony CISOFlorida-2013 - Miami,USA Security
Opening Keynote\t:Increasing Engagement and Performance at Rayonier Mitch Walters CISOFlorida-2013 - Miami,USA Security
Delivering the Business of Tomorrow Whitney Bouck CISOFlorida-2013 - Miami,USA Security
Street Smart Security – Securing the Mobile Enterprise Kevin Beaver CISOFlorida-2013 - Miami,USA Security
A ‘State of the Union’ on the Threat Landscape Patrick Gray CISOFlorida-2013 - Miami,USA Security
Tipping Point – Big Data Leading Innovation Patricia Florissi CISOFlorida-2013 - Miami,USA Security
Crowdsourcing to Save Money and Increase Security Awareness Glen Taylor CISOFlorida-2013 - Miami,USA Security
Simplifying BYOD Dave Snyder CISOPhiladelphia-2013 - Philadelphia,USA Security
Rethinking the Web Application Certification and Accreditation Process Erik Avakian CISOPhiladelphia-2013 - Philadelphia,USA Security
What Are We Missing? Evasive Trends in Malware and Applications Wade Williamson CISOPhiladelphia-2013 - Philadelphia,USA Security
Digital Disruptors – Generation D’s Profound Impact on Enterprise Information Security Ari Lightman CISOPhiladelphia-2013 - Philadelphia,USA Security
Information Security Culture – Myth or Fact Cathy Beech CISOPhiladelphia-2013 - Philadelphia,USA Security
Third-Party Vendor Assessments – Accelerating Best Practices and Mitigating Enterprise Risk Chester Davis CISOPhiladelphia-2013 - Philadelphia,USA Security
The Evolution of Network Security: How Networks Are Still Getting Hacked Omar Santos CarolinaCon-2013 - Raleigh, USA Security
Intro to Lock Picking Smrk3r CarolinaCon-2013 - Raleigh, USA Security
Terminal Cornucopia Treefort CarolinaCon-2013 - Raleigh, USA Security
iPhone Data Reconnaisance without Physical Access to the Device Jarrick CarolinaCon-2013 - Raleigh, USA Security
Search Engine Hacking Stephen Chapman CarolinaCon-2013 - Raleigh, USA Security
The Low Hanging Fruit of Penetration Testing Bryan Miller CarolinaCon-2013 - Raleigh, USA Security
Digital Energy BPT Paul Coggin CarolinaCon-2013 - Raleigh, USA Security
msfpayload isn't dead yet: AV Avoidance in Payload Delivery Melvin2001 CarolinaCon-2013 - Raleigh, USA Security
Exploit Development for Mere Mortals Joe Mccray CarolinaCon-2013 - Raleigh, USA Security
Pwning the Pedophile Joe Seanor CarolinaCon-2013 - Raleigh, USA Security
The Maru Architecture Design: A proposed BYOD architecture Michael Smith CarolinaCon-2013 - Raleigh, USA Security
Burp Suite: Comprehensive Web Pen Testing Joshingeneral CarolinaCon-2013 - Raleigh, USA Security
How the West was Pwned G. Mark Hardy CarolinaCon-2013 - Raleigh, USA Security
Jargon Jitsu: The Tao of Buzzwords Craig Searle CarolinaCon-2013 - Raleigh, USA Security
Dancing With Dalvik Thomas Richards CarolinaCon-2013 - Raleigh, USA Security
KEYNOTE:SHELTERS OR WINDMILLS: THE STRUGGLE FOR POWER AND INFORMATION ADVANTAGE Rick Falkvinge BlackHat EU-2013 - Amsterdam, Netherlands Security
ADVANCED HEAP MANIPULATION IN WINDOWS 8 "zhenhua 'eric' Liu" BlackHat EU-2013 - Amsterdam, Netherlands Security
BUILDING A DEFENSIVE FRAMEWORK FOR MEDICAL DEVICE SECURITY Jay Radcliffe BlackHat EU-2013 - Amsterdam, Netherlands Security
THE DEPUTIES ARE STILL CONFUSED Rich Lundeen BlackHat EU-2013 - Amsterdam, Netherlands Security
FLOATING CAR DATA FROM SMARTPHONES: WHAT GOOGLE AND WAZE KNOW ABOUT YOU AND HOW HACKERS CAN CONTROL TRAFFIC Tobias Jeske BlackHat EU-2013 - Amsterdam, Netherlands Security
HACKING VIDEO CONFERENCING SYSTEMS Moritz Jodeit BlackHat EU-2013 - Amsterdam, Netherlands Security
HARDENING WINDOWS 8 APPS FOR THE WINDOWS STORE Bill Sempf BlackHat EU-2013 - Amsterdam, Netherlands Security
HARNESSING GP²US - BUILDING BETTER BROWSER BASED BOTNETS Marc Blanchou BlackHat EU-2013 - Amsterdam, Netherlands Security
HONEYPOT THAT CAN BITE: REVERSE PENETRATION Alexey Sintsov BlackHat EU-2013 - Amsterdam, Netherlands Security
INVISIBILITY PURGE – UNMASKING THE DORMANT EVENTS OF INVISIBLE WEB CONTROLS – ADVANCED HACKING METHODS FOR ASP.NET, MONO AND RIA Shay Chen BlackHat EU-2013 - Amsterdam, Netherlands Security
LET'S PLAY - APPLANTING Ajit Hatti BlackHat EU-2013 - Amsterdam, Netherlands Security
THE M2M RISK ASSESSMENT GUIDE, A CYBER FAST TRACK PROJECT Don a. Bailey BlackHat EU-2013 - Amsterdam, Netherlands Security
MESH STALKINGS-PENETRATION TESTING WITH SMALL NETWORKED DEVICES Phil Polstra BlackHat EU-2013 - Amsterdam, Netherlands Security
NEXT GENERATION MOBILE ROOTKITS Thomas Roth BlackHat EU-2013 - Amsterdam, Netherlands Security
OPTISIG: SEMANTIC SIGNATURE FOR METAMORPHIC MALWARE Nguyen Anh Quynh BlackHat EU-2013 - Amsterdam, Netherlands Security
POWER ANALYSIS ATTACKS FOR CHEAPSKATES "colin O'flynn" BlackHat EU-2013 - Amsterdam, Netherlands Security
PRACTICAL EXPLOITATION USING A MALICIOUS SERVICE SET IDENTIFIER (SSID) Deral Heiland BlackHat EU-2013 - Amsterdam, Netherlands Security
TO DOCK OR NOT TO DOCK, THAT IS THE QUESTION: USING LAPTOP DOCKING STATIONS AS HARDWARE-BASED ATTACK PLATFORMS Andy Davis BlackHat EU-2013 - Amsterdam, Netherlands Security
USING D-SPACE TO OPEN DOORS Brad Antoniewicz BlackHat EU-2013 - Amsterdam, Netherlands Security
ADVANCED IOS APPLICATION PENTESTING Vivek Ramachandran BlackHat EU-2013 - Amsterdam, Netherlands Security
APPLICATION DEVELOPMENT SECURE CODING WORKSHOP Jim Manico BlackHat EU-2013 - Amsterdam, Netherlands Security
ASSESSING BYOD WITH THE SMARTPHONE PENTEST FRAMEWORK Georgia Weidman BlackHat EU-2013 - Amsterdam, Netherlands Security
POWERSHELL FOR PENETRATION TESTERS Nikhil Mittal BlackHat EU-2013 - Amsterdam, Netherlands Security
Welcome Felix C. Freiling IMF-2013 - Nuremberg, Germany Security
Key Note: Measuring the Cost of Cybercrime Rainer Boehme IMF-2013 - Nuremberg, Germany Security
Preparing for the Smart Grids - Current Practice for Information Security Incident Management in the Power Industry Maria b. Line IMF-2013 - Nuremberg, Germany Security
Wrap-Up\tModerated Holger Morgenstern IMF-2013 - Nuremberg, Germany Security
DATEV Company Presentation Stefan Scheller IMF-2013 - Nuremberg, Germany Security
DATEV NET - internet made secure J\xc3\xb6rg Spilker IMF-2013 - Nuremberg, Germany Security
Key Note:Recent Cyber Attacks: Inherent Risks, Countermeasures, Perspectives Klaus Brunnstein IMF-2013 - Nuremberg, Germany Security
Wrap-Up Oliver Goebel IMF-2013 - Nuremberg, Germany Security
Hands-on reverse engineering of complex modern malware by example of the Stuxnet code Heiko Patzlaff IMF-2013 - Nuremberg, Germany Security
Hacking Embedded Crypto Implementations using Fault Injection Johannes Bauer IMF-2013 - Nuremberg, Germany Security
Tools and Processes for Forensic Analyses of Smartphones and Mobile Applications Michael Mueller IMF-2013 - Nuremberg, Germany Security
Malicious pixels: QR-codes as attack vectors Peter Kieseberg TROOPERS-2013 - Heidelberg, Germany Security
UI Redressing Attacks on Android Devices Marcus Niemietz TROOPERS-2013 - Heidelberg, Germany Security
Working title: “Your IPv6 default config meets FOCA (…and starts to cry)” Chema Alonso TROOPERS-2013 - Heidelberg, Germany Security
Understanding & Mitigating Large Scale DoS Attacks. Adem Sen TROOPERS-2013 - Heidelberg, Germany Security
Hacking & Defending the big 4 Databases Alex Rothacker TROOPERS-2013 - Heidelberg, Germany Security
The future of data exfiltration and malicious communication Steffen Wendzel TROOPERS-2013 - Heidelberg, Germany Security
OAuth2 – Ready or not (here I come) Dominick Baier TROOPERS-2013 - Heidelberg, Germany Security
Corporate Espionage via Mobile Compromise: A Technical Deep Dive David Weinstein TROOPERS-2013 - Heidelberg, Germany Security
Smart TV Security Lee Seungjin TROOPERS-2013 - Heidelberg, Germany Security
The Interim Years of Cyberspace: Security in a Domain of Warfare Robert m. Lee TROOPERS-2013 - Heidelberg, Germany Security
Flash Storage Forensics Dmitry Sklyarov TROOPERS-2013 - Heidelberg, Germany Security
Keynote Peiter "mudge" Zatko CanSecWest-2013 - Vancouver, Canada Security
iOS6.1 - Exploitation 280 Days Later Stephan Esser CanSecWest-2013 - Vancouver, Canada Security
DEP/ASLR bypass without ROP/JIT Yu Yang CanSecWest-2013 - Vancouver, Canada Security
SMS to Meterpreter - Fuzzing USB Modems Rahul Sasi CanSecWest-2013 - Vancouver, Canada Security
Cracking and Analyzing Apple iCloud backups, Find My iPhone, Document Storage. Vladimir Katalov CanSecWest-2013 - Vancouver, Canada Security
Project 53 Dan Hubbard CanSecWest-2013 - Vancouver, Canada Security
Smart TV Security Seungjin Lee CanSecWest-2013 - Vancouver, Canada Security
MS SQL Post Exploitation Shenanigans: You're In, Now What? Rob Beck CanSecWest-2013 - Vancouver, Canada Security
Analysis of a Windows Kernel Vulnerability; From Espionage to Criminal Use Julia Wolf CanSecWest-2013 - Vancouver, Canada Security
The Rising Tide of Ransomware Chester Wisniewski BSidesVancouver-2013 - Vancouver, Canada Security
Cataloging Security Incidents with VERIS Kevin thompson @bfist BSidesVancouver-2013 - Vancouver, Canada Security
FireTalk - Safely Hacking Allen-Bradley PLC's Andrew Fischer BSidesVancouver-2013 - Vancouver, Canada Security
FireTalk - Additive Manufacturing (3d printing) changes everything Matthew Peters BSidesVancouver-2013 - Vancouver, Canada Security
Being an Avivore - Searching Twitter for Data Colin Keigher BSidesVancouver-2013 - Vancouver, Canada Security
New Exploitation and Obfuscation Techniques Roberto Salgado BSidesVancouver-2013 - Vancouver, Canada Security
Finding 0day/APT in memory with memory white lists & visualizations Shane ( K2 ) Macaulay BSidesVancouver-2013 - Vancouver, Canada Security
Taming the House of Cards: Creating a Resilient Enterprise Rafal wh1t3rabbit Los BSidesVancouver-2013 - Vancouver, Canada Security
SCADA IPS Signature Evasion Frank Marcus BSidesVancouver-2013 - Vancouver, Canada Security
Fire Talk - Analysis of malware assisted financial crimes Ruan muller @ruan_muller BSidesVancouver-2013 - Vancouver, Canada Security
Fire Talk - Netsploitation Economics And You Wepiv BSidesVancouver-2013 - Vancouver, Canada Security
Memory Analysis with Volatility 3 Vincent ohprecio @bigsnarfdude BSidesVancouver-2013 - Vancouver, Canada Security
Dr. Strangelog: or How I Stopped Worrying And Learned To Love The Log Alex dow @skynetoperative BSidesVancouver-2013 - Vancouver, Canada Security
The Evolving Web Security Model Ian melven @imelven BSidesVancouver-2013 - Vancouver, Canada Security
WELCOME NOTE Nullconteam NullCon2013-2013 - Goa, India Security
KEYNOTE: Security and Politics? Janardhan Swamy NullCon2013-2013 - Goa, India Security
Workshop - An Introduction to peach fuzzing framework Adam Cecchetti NullCon2013-2013 - Goa, India Security
BYOD: How will it shape your wireless network security in future? Kiran Deshpande NullCon2013-2013 - Goa, India Security
Automating JavaScript Static Analysis Lavakumar Kuppan NullCon2013-2013 - Goa, India Security
Security Evaluation or Escaping from Vulnerability Prison Yury Chemerkin NullCon2013-2013 - Goa, India Security
SamuraiSTFU - SmartGrid Testing Framework for Utilities Justin Searle NullCon2013-2013 - Goa, India Security
Bug Bounty Programs - Crowd Sourcing Vulnerability Research Raymond Forbes NullCon2013-2013 - Goa, India Security
Workshop - GSM Exploitation Aaron Demello NullCon2013-2013 - Goa, India Security
Radio Schizoid Foss meets Trance NullCon2013-2013 - Goa, India Security
Mobile Code mining for discovery and exploits Hemil Shah NullCon2013-2013 - Goa, India Security
Inception of graphical passwords Rishi Narang NullCon2013-2013 - Goa, India Security
KEYNOTE: Sensitive Campus Security with Network Aravind Sitaraman NullCon2013-2013 - Goa, India Security
Hardware Backdooring is Practical Jonathan Brossard NullCon2013-2013 - Goa, India Security
HTML5: attack and defense Ksenia Dmitrieva NullCon2013-2013 - Goa, India Security
Workshop - Memory Forensics Prince Boonlia NullCon2013-2013 - Goa, India Security
SMS to Meterpreter: Fuzzig USB modems Rahul Sasi NullCon2013-2013 - Goa, India Security
Underground Market 101 - Pricing Stats and Schemas Max Goncharov NullCon2013-2013 - Goa, India Security
Reboot Film and Q&A with VFX Lead Aleem Parkar NullCon2013-2013 - Goa, India Security
CSRF Finder as a Mozilla Addon Piyush Pattanayak NullCon2013-2013 - Goa, India Security
Detecting and Exploiting XSS Vulnerabilities with Xenotix XSS Exploitation Framework Ajin Abraham NullCon2013-2013 - Goa, India Security
Why We Need a Science for Software Security Laurie Williams ESSoS-2013 - Paris ,France Security
Privacy technologies for the smart grid Keynote george Danezis ESSoS-2013 - Paris ,France Security
Towards Unified Authorization for Android Michael Bhargavan ESSoS-2013 - Paris ,France Security
Model-Based Usage Control Policy Derivation Prachi Pretschner ESSoS-2013 - Paris ,France Security
Compositional Verification of Application-Level Security Properties Linda Herrmann ESSoS-2013 - Paris ,France Security
Data Loss Prevention – From Installation to Maturity Charles Beierle NAFCU-2013 - Texas, USA Security
Everyone is into Computers, Who is into Yours? William j. Cook NAFCU-2013 - Texas, USA Security
Personal Teller Machines: The Branch Game Changer T.j. Wyman NAFCU-2013 - Texas, USA Security
Building a Higher Order of Security Intelligence Francis Desouza RSA USA-2013 - San Francisco, USA Security
Building and Securing Aadhaar – the World's Largest National ID System Srikanth Nadhamuni RSA USA-2013 - San Francisco, USA Security
Securing the Data Center's Future Today Christopher Young RSA USA-2013 - San Francisco, USA Security
The New Fundamentals of Security Mike Fey RSA USA-2013 - San Francisco, USA Security
Democracy and the Internet Jimmy Wales RSA USA-2013 - San Francisco, USA Security
Criminal Education: Lessons from the Criminals and their Methods Art Gilliland RSA USA-2013 - San Francisco, USA Security
Mind over Matter: Managing Risk with Psychology Instead of Brute Force Andy Ellis RSA USA-2013 - San Francisco, USA Security
How Gaming Can Make a Better World Jane Mcgonigal RSA USA-2013 - San Francisco, USA Security
Remarks by Condoleezza Rice Condoleezza Rice RSA USA-2013 - San Francisco, USA Security
SSL++ : Tales of Transport Layer Security at Twitter @jimio BSidesSanFrancisco-2013 - SanFrancisco,USA Security
Why are we still vulnerable to side channel attacks? (and why should I care?) Jasper van Woudenberg BSidesSanFrancisco-2013 - SanFrancisco,USA Security
Strategic Cyber Security & Warfare: If We Don’t Get It Right, People Die Dr. jamo Limn\xc3\xa9ll BSidesSanFrancisco-2013 - SanFrancisco,USA Security
Press Start: The basics of malware analysis Adam j Kujawa BSidesSanFrancisco-2013 - SanFrancisco,USA Security
RFID Credentials or (Cyber Pearl 9/11 Harbor of DOOM) @backtracesec BSidesSanFrancisco-2013 - SanFrancisco,USA Security
My First Incident Response Team: DFIR for Beginners Chort BSidesSanFrancisco-2013 - SanFrancisco,USA Security
Keynote Dan Kaminsky BSidesSanFrancisco-2013 - SanFrancisco,USA Security
JavaScript Security and HTML5 Mike Schema BSidesSanFrancisco-2013 - SanFrancisco,USA Security
Build your own Android botnet Kevin Mcnamee BSidesSanFrancisco-2013 - SanFrancisco,USA Security
Hitting above the Security Mendoza Line Ed Bellis BSidesSanFrancisco-2013 - SanFrancisco,USA Security
An Anti-Forensics Primer Jason Andress BSidesSanFrancisco-2013 - SanFrancisco,USA Security
TBA Violet Blue BSidesSanFrancisco-2013 - SanFrancisco,USA Security
The Pineapple Express: Live mobile application hacking demonstration....A speeding bullet to the mobile backend Dan Kuykendall BSidesSanFrancisco-2013 - SanFrancisco,USA Security
Keynote Ellen cram Kowalczyk BSidesPHX-2013 - Arizona,USA Security
Analysis of the 2011 Social Engineering Capture the Flag Contest Eric Maxwell BSidesPHX-2013 - Arizona,USA Security
Smartphone Insecurity Georgia Weidman BSidesPHX-2013 - Arizona,USA Security
Can you hear me now??? Nope?!? Good. Drew "redshift" Porter BSidesPHX-2013 - Arizona,USA Security
Hacking the Self-Promotion Game Marisa Fagan BSidesPHX-2013 - Arizona,USA Security
Understanding Framework Vulnerabilities: Struts 2: A little “sumthin sumthin” for security code reviewers and pentesters Abraham Kang BSidesPHX-2013 - Arizona,USA Security
Network anti-reconnaissance for fun and profit: Messing with Nmap Dan "altf4" Petro BSidesPHX-2013 - Arizona,USA Security
A crisis of identity: Practical advice for tackling Identity Management in the Enterprise Christian Price BSidesPHX-2013 - Arizona,USA Security
How Cryptography Works or Choosing The Right Crypto For The Right Job Mike Danseglio BSidesPHX-2013 - Arizona,USA Security
Expression Rewriting for Optimizing Secure Computation Florian Kerschbaum Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Keynote Michael K. Reiter Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Usable security and privacy Gabriel Ghinita Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Privacy by design: A Framework for the Analysis of Architectural Choices Daniel le M\xc3\xa9tayer Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Web security Elisa Bertino Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Mobile-device security and privacy Alexander Pretschner Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Access control for applications Adam j. Lee Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Keynote: Ronnie Killough (Southwest Research Institute) Ravi Sandhu Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Short papers: Access control and usage control for distributed systems Jae Park Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Panel: Security and Privacy in Human-centered Computing and Big Data Management Gail-joon Ahn Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Short papers: Users and security economics Anna Squicciarini Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Cloud and distributed computing security and privacy Lujo Bauer Third ACM Conference on Data and Application Security and Privacy-2013 - San Antonio,USA Security
Hackers get Schooled: Learning Lessons from Academia N/a Shmoocon-2013 - Washington,USA Security
Beyond Nymwars: An Analysis Of The Online Identity Battleground Aestetix Shmoocon-2013 - Washington,USA Security
Attacking Scada Wireless Systems For Fun And Profit - And Fixing Atlas of D00m Shmoocon-2013 - Washington,USA Security
How To Own A Building: Exploiting the Physical World With Bacnet and the Bacnet Attack Framework Brad Bowers Shmoocon-2013 - Washington,USA Security
Crypto: You're Doing It Wrong Ron Bowes Shmoocon-2013 - Washington,USA Security
PunkSPIDER: An Open Source, Scalable Distributed Fuzzing Project Targeting The Entire Internet Alejandro Caceres Shmoocon-2013 - Washington,USA Security
Armor For Your Android Apps Roman Faynberg Shmoocon-2013 - Washington,USA Security
Bringing The Sexy Back To...Defense In Depth Martin Fisher Shmoocon-2013 - Washington,USA Security
C10M – Defending the Internet At Scale Robert Graham Shmoocon-2013 - Washington,USA Security
Hacking As An Act Of War G. Mark Hardy Shmoocon-2013 - Washington,USA Security
Malware Analysis: Collaboration, Automation & Training Richard Harman Shmoocon-2013 - Washington,USA Security
Mastiff: Automated Static Analysis Framework Tyler Hudak Shmoocon-2013 - Washington,USA Security
Openstack Security Brief Matt Joyce Shmoocon-2013 - Washington,USA Security
Apple iOS Certificate Tomfoolery Tim Medin Shmoocon-2013 - Washington,USA Security
Forensics - ExFat Bastardized for Cameras Scott Moulton Shmoocon-2013 - Washington,USA Security
The Cloud - Storms On The Horizon Tyler Pitchford Shmoocon-2013 - Washington,USA Security
NSM And More With Bro Network Monitor Liam Randall Shmoocon-2013 - Washington,USA Security
Generalized Single Packet Authorization For Cloud Computing Environments Michael Rash Shmoocon-2013 - Washington,USA Security
Ka-Ching! How To Make Real Money Margaret Russell Shmoocon-2013 - Washington,USA Security
How Smart Is Bluetooth Smart? Mike Ryan Shmoocon-2013 - Washington,USA Security
These Go to Eleven: When the Law Goes Too Far Michael ( theprez98 ) Schearer Shmoocon-2013 - Washington,USA Security
Protecting Sensitive Information on iOS Devices David Schuetz Shmoocon-2013 - Washington,USA Security
0wn The Con The shmoo Group Shmoocon-2013 - Washington,USA Security
Mainframed: The Secrets Inside That Black Box Phil Young Shmoocon-2013 - Washington,USA Security
Honeynet Project Opening Remarks Christian Seifert HoneyNet-2013 - Dubai,UAE Security
Keynote Address: Security 2020 Anton Chuvakin HoneyNet-2013 - Dubai,UAE Security
Protecting Ourselves From USB Threats Sebastian Popleau HoneyNet-2013 - Dubai,UAE Security
Seeing Everything: Circumventing Cryptography in Virtual Environments Brian Hay HoneyNet-2013 - Dubai,UAE Security
Advanced Botnet Sinkholing Tillmann Werner HoneyNet-2013 - Dubai,UAE Security
How Big Data, Data Mining, and Visualization Enable Security Intelligence Raffael Marty HoneyNet-2013 - Dubai,UAE Security
Secure Exploit Payload Staging…or how we did not kill an 0day at Defcon Georg Wicherski HoneyNet-2013 - Dubai,UAE Security
Reversing Malicious Flashy Flash Mahmud ab Rahman HoneyNet-2013 - Dubai,UAE Security
Honeypots: State of the Practice Piotr Kijewski HoneyNet-2013 - Dubai,UAE Security
Operation Red October Roel Schouwenberg Suits And Spooks DC-2013 - Washington, USA Security
Q&A via IRC chat with The Jester Jeffrey Carr Suits And Spooks DC-2013 - Washington, USA Security
Welcome to the e-Crime Germany "chairman's Welcome" e-Crime Germany-2013 - Germany,Frankfurt Security
Myths versus Reality when fighting DDoS attacks Ron Meyran e-Crime Germany-2013 - Germany,Frankfurt Security
Total control: taking control of enterprise SSL Matthias Senft e-Crime Germany-2013 - Germany,Frankfurt Security
Keynote Divyakant Agrawal Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
Busy Beaver Machines and the Observant Otter Heuristic James Harland Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
Invited talk - Chris Wallace Award recipient Michael Sheng Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
An Investigation of Usability Issues in AJAX based Web Sites Chris Pilgrim Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
Analysing homogenous patient journeys to assess quality of care for patients admitted outside of their 'home-ward' Lua perimal Lewis Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
The new Royal Adelaide Hospital –The Age of the Digital Hospital Dawns in South Australia Allan h. Baird Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
Next Generation Linkage Management System Julie Harris Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
Model-driven programming education Michael e. Caspersen Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
AusPDC-invited-talk Bahman Javadi Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
E-Learning from Past Mistakes Richard Sinnott Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
ACE-invited-talk Angela Carbone Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
Taking Competencies Seriously Mats Daniels Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
Keynote: Maki Sugimoto Australasian Information Security Conference (ACSW-AISC)-2013 - Adelaide, Australia Security
Key International Challenges for Cooperation and Coordination against Cyber Attacks Pieter de Crem CDANS-2013 - UK, London Security
The Cyber Security Strategy of Finland Arto Raty CDANS-2013 - UK, London Security
Preparing for Cyber War Robert Bigman CDANS-2013 - UK, London Security
NATO’s Priorities in Cyber Security and Terrorism - Emerging Security Challenges Division Jamie Shea CDANS-2013 - UK, London Security
Cyber Intelligence: A Critical Aspect of Asymmetric Cyber Warfare Amit Maitra CDANS-2013 - UK, London Security
Redefining Advanced Persistent Threats Panos Dimitriou CDANS-2013 - UK, London Security
Current, Emerging and Future Cyber Security Capabilities and Challenges: A Canadian Forces Perspective David Neasmith CDANS-2013 - UK, London Security
The Swedish Military Approach to Cyber Defence and Security General dennis Gyllensporre CDANS-2013 - UK, London Security
SESSION RESERVED FOR IXIA Richard Favier CDANS-2013 - UK, London Security
A Comprehensive Policy and Strategy Against Cyber Terrorism Virgilio Hernandez CDANS-2013 - UK, London Security
A Perspective from the United States on Cyber Security Strategies and Capabilities Michael a. Stone CDANS-2013 - UK, London Security
Information Warfare & Developing Nations: Cyber Becomes an Equalizer Brian Contos CDANS-2013 - UK, London Security
Opening Remarks Ugur Guven ICICN-2013 - Singapore,NA Security
Keynote Speech 1 Ma Maode ICICN-2013 - Singapore,NA Security
Keynote Speech 2 Chin-chen Chang ICICN-2013 - Singapore,NA Security
Keynote Speech 3 Ugur Guven ICICN-2013 - Singapore,NA Security
A Framework for Mobile Object Recognition of Internet of Things Devices and Inference with Contexts Jin-suk Kang ICICN-2013 - Singapore,NA Security
Effective of Transformational Leadership in human capital management for Creating a sustainable ASEAN Community (AEC) Sukumarl Koednok ICICN-2013 - Singapore,NA Security
Newcomers’ General Positive Perceptions towards Managers, Coworkers, and Organization: An Application in Hotels Safak Unuvar ICICN-2013 - Singapore,NA Security
A Comparative Evaluation of Regulations For Corporations in Previous and New Turkish Commercial Codes [1] Semih Buyukipekci ICICN-2013 - Singapore,NA Security
Communication Process In Green Marketing And A Field Study On The Attitudes Of University Students Towards Green Marketing Osman Unuvar ICICN-2013 - Singapore,NA Security
Efficient Partial Distortion Algorithms with Sorting Order of Calculation for Motion Estimation Ming-te Wu ICICN-2013 - Singapore,NA Security
Workplace Dimensions: Tacit Knowledge Sharing in Universities Ritesh Chugh ICICN-2013 - Singapore,NA Security
Transformation of HR Professionals to be a Change Agent: Realistic Goal or Just a Dream? Choi sang Long ICICN-2013 - Singapore,NA Security
Which factors do affect success of business incubators? Nobuya Fukugawa ICICN-2013 - Singapore,NA Security
Authentication Management for Information System Security Based on Iris Recognition Yao-hong Tsai ICICN-2013 - Singapore,NA Security
J0035 Semantic Searching IT Careers Concepts Based on Ontology N/a ICICN-2013 - Singapore,NA Security
J0038 Major determinants for the successful implementation of technology roadmap in the technology intensive organization : a case of Smart Grid roadmap in Korea Won il Lee ICICN-2013 - Singapore,NA Security
J0010 Secret Sharing Using Meaningful Images Hao-kuan Tso ICICN-2013 - Singapore,NA Security
Introduction to SiLK Ron Bandes FloCon-2013 - Albuquerque, USA Security
Identifying Network Traffic Activity Via Flow Sizes Michael Collins FloCon-2013 - Albuquerque, USA Security
Detecting Insider Threats with Netflow Tom ( Decius ) Cross FloCon-2013 - Albuquerque, USA Security
Flow Analysis Using MapReduce: Strengths and Limitations Markus de Shon FloCon-2013 - Albuquerque, USA Security
Smart Sensors for Flow Collection at 10G, 40G, 100G, and Beyond ... Tony Waller FloCon-2013 - Albuquerque, USA Security
Pflanzenhacken richtig Alexander Chaos Communication Congress-29 - Hamburg, Germany Security
EveryCook Alexis Chaos Communication Congress-29 - Hamburg, Germany Security
Sprache, Ungleichheit und Unfreiheit Anatol Stefanovitsch Chaos Communication Congress-29 - Hamburg, Germany Security
On Breaking SAML Andreas Mayer Chaos Communication Congress-29 - Hamburg, Germany Security
Russias Surveillance State Andrei Soldatov Chaos Communication Congress-29 - Hamburg, Germany Security
What accessibility has to do with security Anna Shubina Chaos Communication Congress-29 - Hamburg, Germany Security
Best of ... Verfassungsschutz Anne Roth Chaos Communication Congress-29 - Hamburg, Germany Security
INDECT, Verhaltenserkennung & Co Ben Chaos Communication Congress-29 - Hamburg, Germany Security
Securing the Campaign Ben Hagen Chaos Communication Congress-29 - Hamburg, Germany Security
Closing Event,Opening Event Bios Chaos Communication Congress-29 - Hamburg, Germany Security
Was ist, was kann, was soll Gender Studies Informatik? Britta Schinzel Chaos Communication Congress-29 - Hamburg, Germany Security
The Care and Feeding of Weird Machines Found in Executable Metadata Bx Chaos Communication Congress-29 - Hamburg, Germany Security
White IT, Clean IT & CEO Coalition Christian Bahls Chaos Communication Congress-29 - Hamburg, Germany Security
Privacy and the Car of the Future Christie Chaos Communication Congress-29 - Hamburg, Germany Security
CCC-Jahresrckblick Constanze Kurz Chaos Communication Congress-29 - Hamburg, Germany Security
Die Antiterrordatei Trojaner-Blindflug Constanze Kurz Chaos Communication Congress-29 - Hamburg, Germany Security
CCC-Jahresrckblick Die Antiterrordatei Fnord-Jahresrckblick Security Nightmares Frank Rieger Chaos Communication Congress-29 - Hamburg, Germany Security
We are all lawmakers! Gregor Hackmack Chaos Communication Congress-29 - Hamburg, Germany Security
Stabilittsanker & Wachstumslokomotive Hans Huett Chaos Communication Congress-29 - Hamburg, Germany Security
Not my department The Tor software ecosystem Jacob Appelbaum Chaos Communication Congress-29 - Hamburg, Germany Security
Proximax, Telex, Flashproxy oder Tor Bridges Jens Kubieziel Chaos Communication Congress-29 - Hamburg, Germany Security
Defend your Freedoms Online: It's Political, Stupid! Jrmie Zimmermann Chaos Communication Congress-29 - Hamburg, Germany Security
IFG: Chance oder Brgerbluff? Jrg Tauss Chaos Communication Congress-29 - Hamburg, Germany Security
Analytical Summary of the BlackHole Exploit Kit Julia Wolf Chaos Communication Congress-29 - Hamburg, Germany Security
NOC Review Kay Chaos Communication Congress-29 - Hamburg, Germany Security
Siechtum und Sterben der rztlichen Schweigepflicht Kay Hamacher Chaos Communication Congress-29 - Hamburg, Germany Security
Privatisierung der Rechtsdurchsetzung The Grand EU Data Protection Reform Kirsten Fiedler Chaos Communication Congress-29 - Hamburg, Germany Security
Hacking Philosophy Leena Simon Chaos Communication Congress-29 - Hamburg, Germany Security
ISP's black box Luka Perkov Chaos Communication Congress-29 - Hamburg, Germany Security
Privatisierung der Rechtsdurchsetzung Markus Beckedahl Chaos Communication Congress-29 - Hamburg, Germany Security
Hanussen's mindreading Markuskompa Chaos Communication Congress-29 - Hamburg, Germany Security
Setting mobile phones free Mark van Cuijk Chaos Communication Congress-29 - Hamburg, Germany Security
An Overview of Secure Name Resolution Matthus Wander Chaos Communication Congress-29 - Hamburg, Germany Security
OMG! OER! Michal ( rysiek ) Wozniak Chaos Communication Congress-29 - Hamburg, Germany Security
New Human Interfaces for Music Moldover Chaos Communication Congress-29 - Hamburg, Germany Security
The Ethics of Activist DDOS Actions Molly Sauter Chaos Communication Congress-29 - Hamburg, Germany Security
Marvin und der Blues Moritz Simon Geist Chaos Communication Congress-29 - Hamburg, Germany Security
Many Tamagotchis Were Harmed in the Making of this Presentation Natalie Silvanovich Chaos Communication Congress-29 - Hamburg, Germany Security
Lightning Talks 1 Nick Farr Chaos Communication Congress-29 - Hamburg, Germany Security
Lightning Talks 2 Nick Farr Chaos Communication Congress-29 - Hamburg, Germany Security
Lightning Talks 3 Nick Farr Chaos Communication Congress-29 - Hamburg, Germany Security
29C3 GSM: Cell phone network review Peter Stuge Chaos Communication Congress-29 - Hamburg, Germany Security
Hacker Jeopardy Open Source Schlssel und Schlsser Ray Chaos Communication Congress-29 - Hamburg, Germany Security
HOWTO Hack the law Rejo Zenger Chaos Communication Congress-29 - Hamburg, Germany Security
Sharing Access Risiken beim Betrieb offener (WLAN-)Netze Reto Mantz Chaos Communication Congress-29 - Hamburg, Germany Security
The Tor software ecosystem Roger Dingledine Chaos Communication Congress-29 - Hamburg, Germany Security
Security Nightmares Ron Chaos Communication Congress-29 - Hamburg, Germany Security
Technology in Post-Revolution Tunisia and Egypt Salah Almhamdi Chaos Communication Congress-29 - Hamburg, Germany Security
Safecast: DIY and citizen-sensing of radiation Sean Bonner Chaos Communication Congress-29 - Hamburg, Germany Security
Sind faire Computer mglich? Sebastian Jekutsch Chaos Communication Congress-29 - Hamburg, Germany Security
Ethics in Security Research Sebastian Schrittwieser Chaos Communication Congress-29 - Hamburg, Germany Security
Hacker Jeopardy Stefan ( sec ) Zehl Chaos Communication Congress-29 - Hamburg, Germany Security
Zur Lage der Information Stefan Wehrmeyer Chaos Communication Congress-29 - Hamburg, Germany Security
Further hacks on the Calypso platform Sylvain Munaut Chaos Communication Congress-29 - Hamburg, Germany Security
Cyberpeace statt Cyberwar Sylvia Johnigk Chaos Communication Congress-29 - Hamburg, Germany Security
(Un)Sicherheit Hardware-basierter Festplattenverschlsselung Tilo Chaos Communication Congress-29 - Hamburg, Germany Security
A Rambling Walk Through an EMV Transaction Tim Becker Chaos Communication Congress-29 - Hamburg, Germany Security
Milking the Digital Cash Cow Timo Kasper Chaos Communication Congress-29 - Hamburg, Germany Security
The ultimate Galaksija talk Toma Olc Chaos Communication Congress-29 - Hamburg, Germany Security
Writing a Thumbdrive from Scratch Travis Goodspeed Chaos Communication Congress-29 - Hamburg, Germany Security
Netzaktivsten! Ist das alles, was wir drauf haben? Trojaner-Blindflug Ulf Buermeyer Chaos Communication Congress-29 - Hamburg, Germany Security
Hackers As A High-Risk Population Violet Blue Chaos Communication Congress-29 - Hamburg, Germany Security
A User Modeling Oriented Analysis of Cultural Backgrounds in Microblogging Elena Ilina ASECyberSec-2012 - Washington,USA Security
Nodding without Understanding: An Explorative Study on How Adolescents Listen to Their Teachers Giovanna Leone ASECyberSec-2012 - Washington,USA Security
Robust reputation mechanism for achieving fair compensation and quality assurance in crowdsourcing tasks Shailesh Vaya ASECyberSec-2012 - Washington,USA Security
Social Computing: Its Evolving Definition and Modeling in the Context of Collective Intelligence Yoshifumi Masunaga ASECyberSec-2012 - Washington,USA Security
A Computational Framework for Detecting Malicious Actors in Communities Xing Fang12 ASECyberSec-2012 - Washington,USA Security
A Formal Model of LoA Elevation in Online Trust Hiroyuki Sato ASECyberSec-2012 - Washington,USA Security
Is IPv6 ready for the Smart Grid Tanja Zseby ASECyberSec-2012 - Washington,USA Security
Dynamic Covert Passive Actors Detection Protocol for a Healthy Networked Community Munene Kanampiu14 ASECyberSec-2012 - Washington,USA Security
Infosec Dataviz Jay jacobs - BayThreat-2012 - Sunnyvale,USA Security
BYOD is Changing the Game Adam Ely BayThreat-2012 - Sunnyvale,USA Security
Code Reviewing Applications Built on Web Frameworks Abraham Kang BayThreat-2012 - Sunnyvale,USA Security
A CouNtry's Honerable n3twork deviCes Kurt Grutzmacher BayThreat-2012 - Sunnyvale,USA Security
Teaching Your WAF New Tricks Robert Rowley BayThreat-2012 - Sunnyvale,USA Security
Dynamic Analysis and Exploration of Android Apps Daniel Peck BayThreat-2012 - Sunnyvale,USA Security
Will Your Car Betray You? Christie Dudley BayThreat-2012 - Sunnyvale,USA Security
Going over the ICS Waterfall: An analysis of the Tridium Niagara Framework Billy Rios BayThreat-2012 - Sunnyvale,USA Security
Network Threat Defense Randy Ivener BayThreat-2012 - Sunnyvale,USA Security
Risk-based Remediation in an Agile World (or Fix it, Stupid!) Ankur Chakraborty BayThreat-2012 - Sunnyvale,USA Security
IR Stories From the Vendor's Haunted Basement Peter Venkman BayThreat-2012 - Sunnyvale,USA Security
Games We Play: Defenses and Disincentives Allison Miller BayThreat-2012 - Sunnyvale,USA Security
Where to Start When Securing a Startup? Christie Grabyan BayThreat-2012 - Sunnyvale,USA Security
Facilitating Fluffy Forensics Andrew Hay BayThreat-2012 - Sunnyvale,USA Security
My First Incident Response Team: DFIR for Beginners Chort BayThreat-2012 - Sunnyvale,USA Security
Brobots Poppin Boxen King Tuna BayThreat-2012 - Sunnyvale,USA Security
Shit I Learned on the Red Team (the Hard Way) Savant BayThreat-2012 - Sunnyvale,USA Security
Social Engineering and Penetration Testing Valerie Thomas BayThreat-2012 - Sunnyvale,USA Security
Building Your House on Sand Brett Hardin BayThreat-2012 - Sunnyvale,USA Security
Offense In Depth Colton Ericksen BayThreat-2012 - Sunnyvale,USA Security
Business Innovation Through Security Intelligence Roland Cloutier CISONewJersey-2012 - New Jersey, USA Security
CISOs and Engineers Bridging the Communication Gap to Secure Critical Infrastructure Warren Axelrod CISONewJersey-2012 - New Jersey, USA Security
Rebranding Security The Added Value of a Positive Mind Kylie Watson CISONewJersey-2012 - New Jersey, USA Security
Winning Strategies for Detecting and Defeating Cyber Attacks Aaron Card CISONewJersey-2012 - New Jersey, USA Security
The ART of Security Context: Metrics without Meaning are Useless David Oberry CISOToronto-2012 - Toronto, Canada Security
Information Protection at Target Its in the Culture Brenda Bjerke CISOToronto-2012 - Toronto, Canada Security
The Ten Commandments of Influencing High-Level Executives Tc Waisman CISOToronto-2012 - Toronto, Canada Security
Embed Privacy and Security by Design and Gain a Competitive Advantage Ann Cavoukian CISOToronto-2012 - Toronto, Canada Security
Partnering with the Business to Manage Technology in a Complex Regulatory Environment Paul Milkman CISOToronto-2012 - Toronto, Canada Security
Opening Remarks & Keynote Speaker: Information Security Threats to Banking Chris Smith asisonline-2012 - Hong Kong,China Security
ADVANCED EXPLOITATION OF ARM-BASED MOBILE AND EMBEDDED DEVICES Stephen Ridley Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Security
ENTERPRISE MALWARE, THERE IS ALWAYS A WAY. DNS/DNSSEC Alberto garcia Illera Blackhat Abu Dhabi-2012 - Abu Dhabi, UAE Security
Risk Engineering: social engineering your way ahead of the Security Poverty Line Andy Ellis SecurityZone-2012 - Cali, Colombia Security
Collaborate, Innovate, Secure Wim Remes SecurityZone-2012 - Cali, Colombia Security
Security Intelligence for a Smarter Planet Kent Blossom SecurityZone-2012 - Cali, Colombia Security
Security Return On Investment (ROI) Matthew Ferrante SecurityZone-2012 - Cali, Colombia Security
Sexy Defense - Maximizing Home field advantage Ian Amit SecurityZone-2012 - Cali, Colombia Security
Doubt, Deceit, Deficiency and Decency - a Decade of Disillusionment James Arlen SecurityZone-2012 - Cali, Colombia Security
A journey into the privacy and security risks of a cloud computing service Marco Balduzzi SecurityZone-2012 - Cali, Colombia Security
Social Engineering Using Smartphones as Emerging Attack Vector Ing. Sanabria SecurityZone-2012 - Cali, Colombia Security
Cybersecurity Strategy for the protection of Colombia's critial infrastructure. Leonardo huertas Calle SecurityZone-2012 - Cali, Colombia Security
Moar Anti-Forensics Plox Dual Core SecurityZone-2012 - Cali, Colombia Security
Downfall of AntiVirus Software Alfonso Deluque SecurityZone-2012 - Cali, Colombia Security
SIEM "Security Information and Event Management" Ciro antonio Dussan SecurityZone-2012 - Cali, Colombia Security
The New Defense In Depth (Bringing The Sexy Back To The Blue Team) Martin Fisher SecurityZone-2012 - Cali, Colombia Security
Pen Test with OSSTMM John jairo Hernandez SecurityZone-2012 - Cali, Colombia Security
IPv6 insecurities - from Initial findings in 2005 to Latest findings 2012 Marc Heuse SecurityZone-2012 - Cali, Colombia Security
IPv6 Insecurity Revolutions Marc Heuse SecurityZone-2012 - Cali, Colombia Security
The Modern Approach to Risk Management and Fishing For Risk Alex Hutton SecurityZone-2012 - Cali, Colombia Security
Taking Control of a Hosting Provider Matias Katz SecurityZone-2012 - Cali, Colombia Security
HTExploit - Bypassing you htaccess and beyond! Matias Katz SecurityZone-2012 - Cali, Colombia Security
Owning one to rule them all Dave Kennedy SecurityZone-2012 - Cali, Colombia Security
Big Bang Theory: The Evolution of Pentesting High Security Environments Joe Mccray SecurityZone-2012 - Cali, Colombia Security
Want to get better at security? Improve your ops and improve your dev. David Mortman SecurityZone-2012 - Cali, Colombia Security
Living Below the Security Poverty Line Wendy Nather SecurityZone-2012 - Cali, Colombia Security
Tactical Surveillance: Look at me now! Chris Nickerson SecurityZone-2012 - Cali, Colombia Security
A "BUG" Hunter\'s approach to Zero Day Carlos mario Penagos SecurityZone-2012 - Cali, Colombia Security
Mobile Attacks What will the future bring? Nicholas J. Percoco SecurityZone-2012 - Cali, Colombia Security
DNS Reconnaissance with DNSRecon Carlos Perez SecurityZone-2012 - Cali, Colombia Security
Professional Development in Information Security Felipe agustn Rodrguez SecurityZone-2012 - Cali, Colombia Security
Forensic Analisys on iOS Devices Jaime Gomez SecurityZone-2012 - Cali, Colombia Security
On the (Im)possibility of Projecting Property in Prime-Order Setting Jae hong Seo ASIACRYPT-2012 - Beijing,China Security
Pairing-based Cryptography: Past, Present, and Future Dan Boneh ASIACRYPT-2012 - Beijing,China Security
Optimal Reductions of Some Decisional Problems to the Rank Problem Jorge luis Villar ASIACRYPT-2012 - Beijing,China Security
Analysis of differential attacks in ARX constructions Gaetan Leurent ASIACRYPT-2012 - Beijing,China Security
Some Mathematical Mysteries in Lattices Chuanming Zong ASIACRYPT-2012 - Beijing,China Security
Provable Security of the Knudsen-Preneel Compression Functions Jooyoung Lee ASIACRYPT-2012 - Beijing,China Security
Optimal Collision Security in Double Block Length Hashing with Single Length Key Bart Mennink ASIACRYPT-2012 - Beijing,China Security
Bicliques for permutations: collision and preimage attacks in stronger settings Dmitry Khovratovich ASIACRYPT-2012 - Beijing,China Security
Critical Infrastructure Security Subodh Belgi ClubHack-2012 - Pune, India Security
Infrastructure Security Sivamurthy Hiremath ClubHack-2012 - Pune, India Security
Smart Grid Security Falgun Rathod ClubHack-2012 - Pune, India Security
Legal Nuances to the Cloud Ritambhara Agrawal ClubHack-2012 - Pune, India Security
Hacking and Securing iOS applications Satish Bommisetty ClubHack-2012 - Pune, India Security
HAWAS Hybrid Analyzer for Web Application Security Lavakumar Kuppan ClubHack-2012 - Pune, India Security
The difference between the Reality and Feeling of Security: Information Security and the Human Being Thomas Kurian ClubHack-2012 - Pune, India Security
FatCat Web Based SQL Injector Sandeep Kamble ClubHack-2012 - Pune, India Security
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Ajin Ibrahim ClubHack-2012 - Pune, India Security
Anatomy of a Responsible Disclosure Zero Day Vulnerability in Oracle BI Publisher Vishal Kalro ClubHack-2012 - Pune, India Security
XSSshell Vandan Joshi ClubHack-2012 - Pune, India Security
Content-Type attack -Dark hole in the secure environment Raman Gupta ClubHack-2012 - Pune, India Security
Real Time Event Recording System, the tool for Digital Forensics Investigation Madhav Limaye ClubHack-2012 - Pune, India Security
Putting Application Security Maturity Models in Practice Ketan Vyas ClubHack-2012 - Pune, India Security
The Other 48 Cyber Sharing for the Rest of Us Jeff Brown CISOBoston-2012 - Boston,USA Security
The Transformed and Transforming CISO Thornton May CISOBoston-2012 - Boston,USA Security
Risk Management and Communicating with the BOD Bruce Forman CISOBoston-2012 - Boston,USA Security
Keynote Mark Weatherford CISOSanFrancisco-2012 - San Francisco,USA Security
Best Practice Matthew Archibald CISOSanFrancisco-2012 - San Francisco,USA Security
Out With the Old, In With the New Reinvent and Justify Your 2013 Security Strategy Gidi Cohen CISOSanFrancisco-2012 - San Francisco,USA Security
CISOs Guide Five Initiatives You Can Do Now James Robinson CISOSanFrancisco-2012 - San Francisco,USA Security
Advancing Your Organization Through Metrics Dan Meacham CISOSanFrancisco-2012 - San Francisco,USA Security
How Netflix Got Creative to Secure the Cloud Bill Burns CISOSanFrancisco-2012 - San Francisco,USA Security
Peer Audits A New Approach to Executive and Program Development Tina Darmohray CISOSanFrancisco-2012 - San Francisco,USA Security
We Came In Peace - They Don't: Hackers vs. CyberWar Felix "fx" Lindner Deepsec-2012 - Vienna, Austria Security
The Vienna Programme: A Global Strategy for Cyber Security by the Global Cyber Defence Initiative Stefan Schumacher Deepsec-2012 - Vienna, Austria Security
Introducing the Smartphone Pentesting Framework Georgia Weidman Deepsec-2012 - Vienna, Austria Security
When I Grow up I want to be a Cyberterrorist Mike Kemp Deepsec-2012 - Vienna, Austria Security
Services of cyber crime and cyber weapons in the Cloud. Stas Filshtinskiy Deepsec-2012 - Vienna, Austria Security
Social Engineering: how far can you go? Sharon Conheady Deepsec-2012 - Vienna, Austria Security
Malware analysis on a shoestring budget Michael Boman Deepsec-2012 - Vienna, Austria Security
Breaking SAP Portal Alexander mikhailovich Polyakov Deepsec-2012 - Vienna, Austria Security
I'm the guy your CSO warned you about "gavin 'jac0byterebel' Ewan" Deepsec-2012 - Vienna, Austria Security
Evolution of E-Money Jon Matonis Deepsec-2012 - Vienna, Austria Security
Cybercrime vs. Cyberstalking - a new Behavior Dr. edith Huber Deepsec-2012 - Vienna, Austria Security
Proximax, Telex, Flashproxy - The current state of circumvention software Jens Kubieziel Deepsec-2012 - Vienna, Austria Security
SAP Slapping Dave Hartley Deepsec-2012 - Vienna, Austria Security
Insecurity? It's just a matter of time Alexey Kachalin Deepsec-2012 - Vienna, Austria Security
The Security (or Insecurity) of 3rd Party iOS Applications Ilja van Sprundel Deepsec-2012 - Vienna, Austria Security
Own the Network - Own the Data Paul Coggin Deepsec-2012 - Vienna, Austria Security
Ways Your Alarm System Can Fail Babak Javadi Deepsec-2012 - Vienna, Austria Security
Passive IPS Reconnaissance and Enumeration - false positive (ab)use Arron "finux" Finnon Deepsec-2012 - Vienna, Austria Security
The Interim Years of Cyberspace - Security in a Domain of Warfare Robert m. Lee Deepsec-2012 - Vienna, Austria Security
Inception of the SAP Platform's Brain: Attacks to SAP Solution Manager Juan Etchegoyen Deepsec-2012 - Vienna, Austria Security
Penetration Testing with Metasploit Georgia Weidman Deepsec-2012 - Vienna, Austria Security
The Exploit Laboratory Advanced Edition Saumil Udayan Shah Deepsec-2012 - Vienna, Austria Security
Web application penetration testing Ari Elias-bachrach Deepsec-2012 - Vienna, Austria Security
SAP Security In-Depth Juan Etchegoyen Deepsec-2012 - Vienna, Austria Security
Malware Forensics and Incident Response Education (MFIRE) Ismael Valenzuela Deepsec-2012 - Vienna, Austria Security
OPSEC: Because Jail is for wuftpd The Grugq ZeroNights-2012 - Moscow, Russia Security
Try Harder 2 Be Yourself Felix ( FX ) Lindner ZeroNights-2012 - Moscow, Russia Security
To be announced Alberto garcia Illera ZeroNights-2012 - Moscow, Russia Security
On security aspects of ADS-B and other "flying" technology Andrei Costin ZeroNights-2012 - Moscow, Russia Security
They told me I could be anything, so I became BAh7BkkiDHVzZXJfaWQGOgZFVGkG Joernchen ( joernchen ) ZeroNights-2012 - Moscow, Russia Security
Mac OS X malware overview Ivan Sorokin ZeroNights-2012 - Moscow, Russia Security
Stealing from Thieves: Breaking IonCube VM to Reverse Exploit Kits Mohamed Saher ZeroNights-2012 - Moscow, Russia Security
Applied anti-forensics: rootkits, kernel vulnerabilities and then some Oleksiuk Dmytro ZeroNights-2012 - Moscow, Russia Security
Modern payments security: EMV, NFC, etc.? Nikita Abdullin ZeroNights-2012 - Moscow, Russia Security
That's why I love XML hacking! Nicolas Gregoire ZeroNights-2012 - Moscow, Russia Security
A blow against MongoDB Mikhail Fyrstov ZeroNights-2012 - Moscow, Russia Security
Armed Failure Hacking Wireless Alarm Systems Babak Javadi ZeroNights-2012 - Moscow, Russia Security
The Art of Binary Diffing or how to find 0-dayz for free Nikita Tarakanov ZeroNights-2012 - Moscow, Russia Security
How I will break your enterprise Alexander mikhailovich Polyakov ZeroNights-2012 - Moscow, Russia Security
MiTM attack on iOS: Methodology and consequences Alexey Troshichev ZeroNights-2012 - Moscow, Russia Security
Android behind the scenes: possible attacks and radical defense measures Sergey Karasikov ZeroNights-2012 - Moscow, Russia Security
Are you ready for the post PC transition... lets start with security, shall we? Jay Bavisi HackerHaltedAsiaPacific-2012 - Kuala Lumpur,Malaysia Security
Big bang theory: the evolution of pentesting high security environments Joe Mccray HackerHaltedAsiaPacific-2012 - Kuala Lumpur,Malaysia Security
Hackers for hire Haja Mohideen HackerHaltedAsiaPacific-2012 - Kuala Lumpur,Malaysia Security
How can I hack your mobile? Wayne Burke HackerHaltedAsiaPacific-2012 - Kuala Lumpur,Malaysia Security
Large scale HTTP header abuse Zachary Wolff HackerHaltedAsiaPacific-2012 - Kuala Lumpur,Malaysia Security
The cloud whisperer: what security secrets is your cloud not disclosing? Tim Pierson HackerHaltedAsiaPacific-2012 - Kuala Lumpur,Malaysia Security
Opening Moataz Salah CSCamp-2012 - Cairo,Egypt Security
Keynote : Social Networking in Cyber Intelligence Jeff Bardin CSCamp-2012 - Cairo,Egypt Security
IS Egypt Hacked? Omar Sherin CSCamp-2012 - Cairo,Egypt Security
Catch me if you can: Stealthy Runtime process infection in Linux Aseem "@" Jakhar CSCamp-2012 - Cairo,Egypt Security
Program or be programmed! Osama Kamal CSCamp-2012 - Cairo,Egypt Security
HTExploit - Bypassing your htaccess and beyond Matias Katz CSCamp-2012 - Cairo,Egypt Security
Vulnerability From The Future Mohamed Bedewi CSCamp-2012 - Cairo,Egypt Security
Opening Remarks Carolina Cosse OWASPAppSecLatam-2012 - Antel,Uruguay Security
OWASP Board Kickoff Matt Tesauro OWASPAppSecLatam-2012 - Antel,Uruguay Security
KEYNOTE :Building Security Into Frameworks: Who is doing it right Jerry Hoff OWASPAppSecLatam-2012 - Antel,Uruguay Security
Assessing Application Security Risk Alex Bauert OWASPAppSecLatam-2012 - Antel,Uruguay Security
Reducing Web Application Attack Surface with a HMAC based protocol Breno Silva OWASPAppSecLatam-2012 - Antel,Uruguay Security
Your Website: a weapon for cybercrime Sebastian Bortnik OWASPAppSecLatam-2012 - Antel,Uruguay Security
Don't try to block the out the sub with your fingers! Information harvesting with Test-driven development tools and understanding how to avoid it Nicolas Rodriguez OWASPAppSecLatam-2012 - Antel,Uruguay Security
KEYNOTE :Tainted variables to find Potentially Vulnerable Functions (PVF) Cristian Borghello OWASPAppSecLatam-2012 - Antel,Uruguay Security
Using PASTA as a core ingredient to web application threat modeling Tony Ucedavelez OWASPAppSecLatam-2012 - Antel,Uruguay Security
Malware on Mobile Devices Sebastian Bortnik OWASPAppSecLatam-2012 - Antel,Uruguay Security
How dynamic have been static checking? Felipe Zipitria OWASPAppSecLatam-2012 - Antel,Uruguay Security
KEYNOTEFrom FUN to CRIME Juliano Rizzo OWASPAppSecLatam-2012 - Antel,Uruguay Security
Criteria for Institutionalizing Security in Software Development Processes Francisco Nunes OWASPAppSecLatam-2012 - Antel,Uruguay Security
Understanding HTML5 Security Andrès Pablo Riancho OWASPAppSecLatam-2012 - Antel,Uruguay Security
A real ZAP Story Mateo Martinez OWASPAppSecLatam-2012 - Antel,Uruguay Security
Resource Certification: "Implementation Challenges" Dario Gomez OWASPAppSecLatam-2012 - Antel,Uruguay Security
KEYNOTE :The security of your company will be compromised Hernn m. Racciatti OWASPAppSecLatam-2012 - Antel,Uruguay Security
OWASP Mobile Top 10 Mauro Flores OWASPAppSecLatam-2012 - Antel,Uruguay Security
OWASP ODZ Multi CMS Scanner Mennouchi islam Azzedine OWASPAppSecLatam-2012 - Antel,Uruguay Security
Bootstrapping InfoSec for Hacktivists Liz Henry Kiwicon-2012 - Wellington, New Zealand Security
NFC Redux Nick von Dadelszen Kiwicon-2012 - Wellington, New Zealand Security
Login Timing Attacks for Mischief and Mayhem Adrian Hayes Kiwicon-2012 - Wellington, New Zealand Security
From Revenue Assurance to Assurance: The Importance of Measurement in Computer Security Peter Gutmann Kiwicon-2012 - Wellington, New Zealand Security
Sifting through Twitter Matt Jones Kiwicon-2012 - Wellington, New Zealand Security
Biohacking: Why is my kitten glowing? Andrew Woodward Kiwicon-2012 - Wellington, New Zealand Security
m/ ROP and ROLL m/ Antic0de Kiwicon-2012 - Wellington, New Zealand Security
Firehoses and Asbestos Pants: Security at Microsoft from Response to Lifecycle Leigh ( Hypatiadotca ) Honeywell Kiwicon-2012 - Wellington, New Zealand Security
Managed Service Pwnage Cartel Kiwicon-2012 - Wellington, New Zealand Security
Master Phishing: Writing a Phish That Won't Get You Busted (or, How To Bust Phishers) Alex Kirk Kiwicon-2012 - Wellington, New Zealand Security
Under The Radar Web App Recon Dean "tecnik" Jerkovich Kiwicon-2012 - Wellington, New Zealand Security
Exchanging Demands Peter Hannay Kiwicon-2012 - Wellington, New Zealand Security
Open source security response David Jorm Kiwicon-2012 - Wellington, New Zealand Security
The tale of a Firefox bug Thoth Kiwicon-2012 - Wellington, New Zealand Security
Ghost Riders in your WLAN Denis Andzakovic Kiwicon-2012 - Wellington, New Zealand Security
Abruptly Mangle the Web Thibaud Weksteen Kiwicon-2012 - Wellington, New Zealand Security
The Mysterious Case Of The Shrinking Pentest Toolkit Andrew "lizardb0y" Stephen Kiwicon-2012 - Wellington, New Zealand Security
in2securITy - What we did last year and other mad ideas <strike>for world domination</strike> Laura "ladynerd" Bell Kiwicon-2012 - Wellington, New Zealand Security
Do not ask for whom the panopticon watches, it watches for thee. Thomas Beagle Kiwicon-2012 - Wellington, New Zealand Security
Hacker History: Dmitry and the DMCA Ed Hintz Kiwicon-2012 - Wellington, New Zealand Security
I Love You Sweet Leaf Bodhi Sativa Kiwicon-2012 - Wellington, New Zealand Security
Bit flipping, favicons, and what the hell is your browser actually doing? Blair "trogs" Harrison Kiwicon-2012 - Wellington, New Zealand Security
The OSINT OPSEC Tool Brendan "hyprwired" J Kiwicon-2012 - Wellington, New Zealand Security
httpSeriously? Kirk Jackson Kiwicon-2012 - Wellington, New Zealand Security
Cyberweapons: A Look at Flame and Beyond Roel Schouwenberg CSAW-2012 - Brooklyn,USA Security
An Introduction to Industrial Control Systems Cyber Security Neil f. Hershfield CSAW-2012 - Brooklyn,USA Security
Whole Picture Leadership Steve Patterson CISOPhoenix-2012 - Phoenix,USA Security
Keynote:Fostering Your Future The Disney Leadership Tool Box Allen Fazio CISOPhoenix-2012 - Phoenix,USA Security
Transforming IT Organizational Performance Using Toyota Production System Methods Robert Slepin CISOPhoenix-2012 - Phoenix,USA Security
The Power of Strategic Recruitment Jonathan Young CISOPhoenix-2012 - Phoenix,USA Security
Imagining the Future of Data Michael Guggemos CISOPhoenix-2012 - Phoenix,USA Security
Information Security Metrics that Matter David Gillman CISOPhoenix-2012 - Phoenix,USA Security
Building a Vibrant Workplace Corporate Culture Done Right Tom Mendoza CISOPhoenix-2012 - Phoenix,USA Security
Know Your Cyber Threat Paul m. Schaaf CISOPhoenix-2012 - Phoenix,USA Security
Security 2016 How Security Must Evolve in the Next Four Years Charles Ross CISOPhoenix-2012 - Phoenix,USA Security
Transformational Leadership Revitalize Your Company Ron Bloom CISOPittsburgh-2012 - Pittsburgh,USA Security
Virtual Technology, Real Results CONSOLs Security Transformation George Rosato CISOPittsburgh-2012 - Pittsburgh,USA Security
Accelerating the Business Through Apps and Architecture Dan Pavlick CISOPittsburgh-2012 - Pittsburgh,USA Security
What You Need to Know About DDoS Attacks Holly Ridgeway CISOPittsburgh-2012 - Pittsburgh,USA Security
Creating Better Business Value The Unlikely Relationship Between IT and Procurement Dave Mclain CISOPittsburgh-2012 - Pittsburgh,USA Security
Rethinking the Web Application Certification and Accreditation Process Erik Avakian CISOPittsburgh-2012 - Pittsburgh,USA Security
CIOs, CMOs and Big Data Successful, Strategic Partnership Chris Labash CISOPittsburgh-2012 - Pittsburgh,USA Security
From the Greatest Generation to the Most Disruptive Ari Lightman CISOPittsburgh-2012 - Pittsburgh,USA Security
The Future of Cyber Crime and Terrorism Marc Goodman Paranoia-2012 - Oslo,Norway Security
Motivation is changing in online crime Amnon Bar-lev Paranoia-2012 - Oslo,Norway Security
Pause - 8 minutes lyntale in Krogh Salen Paranoia-2012 - Oslo,Norway Security
Attacking NFC Charlie Miller Paranoia-2012 - Oslo,Norway Security
The Changing Threat Landscape: Protecting Against Advanced Targeted Attacks Paul Davis Paranoia-2012 - Oslo,Norway Security
8 minutes lyntale in Krogh Salen Jon Bjrnland Paranoia-2012 - Oslo,Norway Security
Norwegian companies in the digital space. What are the risks? Eiliv Ofigsb Paranoia-2012 - Oslo,Norway Security
The Problem of Our Age Carlos Solari Paranoia-2012 - Oslo,Norway Security
Pause - 8 minutes lyntale in Krogh Salen Roger Hockaday Paranoia-2012 - Oslo,Norway Security
Security in Mobile Applications Espen Graarud Paranoia-2012 - Oslo,Norway Security
Keynote Speaker:Smartphone Pentest Framework Georgia Weidman BSidesJackson-2012 - Jackson,USA Security
Why memory analysis should be part of your forensics and IR process Andrew Case BSidesJackson-2012 - Jackson,USA Security
SCADA HMI Vulnerability Hands-on Training Wesley Mcgrew BSidesJackson-2012 - Jackson,USA Security
Protection, Cyber Security, and Related Productivity Gains Jeff Gill BSidesJackson-2012 - Jackson,USA Security
Advanced Registry Forensics with Registry Decoder Lodovico Marziale BSidesJackson-2012 - Jackson,USA Security
Metasploit for Beginners Workshop Georgia Weidman BSidesJackson-2012 - Jackson,USA Security
Hacking with WebSockets Vaagn Toukharian BSidesJackson-2012 - Jackson,USA Security
Bootkit defeat research Aaron Lemasters BSidesJackson-2012 - Jackson,USA Security
The Badmin Project Gillis Jones BSidesJackson-2012 - Jackson,USA Security
Balancing Risk Logan Kleier BSidesPDX-2012 - Portland,USA Security
Mutating metal to make our meter an automated penetrator Kenny Mcelroy BSidesPDX-2012 - Portland,USA Security
Anonymizing your hacktop Kenny Mcelroy BSidesPDX-2012 - Portland,USA Security
Reverse Engineering the Nikon WT...F? @securelyfitz BSidesPDX-2012 - Portland,USA Security
Retail Hacking for Fun and Savings @securelyfitz BSidesPDX-2012 - Portland,USA Security
Where's the data at? Martin Mckeay BSidesPDX-2012 - Portland,USA Security
How to hack my Twitter Sundar Krishnamurthy BSidesPDX-2012 - Portland,USA Security
In pentesting there are too many tools using tools. William Borskey BSidesPDX-2012 - Portland,USA Security
PWND BY DEVICES Ken Westin BSidesPDX-2012 - Portland,USA Security
Hacking with WebSockets Sergey Shekyan BSidesPDX-2012 - Portland,USA Security
Making physical attacks remotely James Shewmaker BSidesPDX-2012 - Portland,USA Security
An Adversary for All Occasions John Mailen BSidesPDX-2012 - Portland,USA Security
The rise in HTML5 threats: Lessons of the webs past ignored again Steve Orrin BSidesPDX-2012 - Portland,USA Security
Mobile Device Attack graphs for fun and profit Jimmy Shah BSidesPDX-2012 - Portland,USA Security
Immobilized by Mobile Vulns in the NVD Dirk Sigurdson BSidesPDX-2012 - Portland,USA Security
Squint at Gibberish No Longer: Introducing Bletchley Tim Morgan BSidesPDX-2012 - Portland,USA Security
Who's coming after the cookies in your cookie jar? @wepiv BSidesPDX-2012 - Portland,USA Security
Reverse Engineering to Subvert Smartcard Security Barriers Christopher Tarnovsky BSidesPDX-2012 - Portland,USA Security
Welcome To PhreakNIC Warren Eckstein PhreakNIC-2012 - Murfreesboro,USA Security
Magnets, How Do They Work? Michael Snyder PhreakNIC-2012 - Murfreesboro,USA Security
Own The Network Own The Data Paul Coggin PhreakNIC-2012 - Murfreesboro,USA Security
Something About Middleware Douglas Schmidt PhreakNIC-2012 - Murfreesboro,USA Security
Hiring The Unhireable: Solving The Cyber Security Hiring Crisis From DHS To Wall Street Winn Schwartau PhreakNIC-2012 - Murfreesboro,USA Security
Network King Of The Hill (NetKotH): A Hacker Wargame For Organizers Who Are Lazy Bastards Adrian Crenshaw PhreakNIC-2012 - Murfreesboro,USA Security
Where We're Going We Don't Need Keys Sp0rus PhreakNIC-2012 - Murfreesboro,USA Security
The Effects Of Online Gaming Addiction Gregory c. Mabry PhreakNIC-2012 - Murfreesboro,USA Security
Starting Up A Crypto Party Peace PhreakNIC-2012 - Murfreesboro,USA Security
IP Law: Myths And Facts Rick Sanders PhreakNIC-2012 - Murfreesboro,USA Security
The Power Of Names: How We Define Technology, And How Technology Defines Us Aestetix PhreakNIC-2012 - Murfreesboro,USA Security
DNS Sec Today Thomas Clements PhreakNIC-2012 - Murfreesboro,USA Security
Why I Am Pessimistic About The Future Tom ( Decius ) Cross PhreakNIC-2012 - Murfreesboro,USA Security
Cloud Security Contract Primer Randy Sabett SouthEastInfoSecForum-2012 - Atlanta,USA Security
Techniques dintrusion physique Daniel Lahaye Hackfest-2012 - Quebec,Canada Security
Breaking the Comfort Zone: Penetration Testing Dave Kennedy Hackfest-2012 - Quebec,Canada Security
War Stories: Lessons Learned From Falling On Swords Dave Lewis Hackfest-2012 - Quebec,Canada Security
Sploitego Maltegos (Local) Partner in Crime Nadeem Douba Hackfest-2012 - Quebec,Canada Security
Techniques de base pour lanalyse de code malicieux en entreprise. David Girard Hackfest-2012 - Quebec,Canada Security
La vigie en scurit de linformation Benot h. Dicaire Hackfest-2012 - Quebec,Canada Security
Arrested by the RCMP in high school to becoming a CISO 15 years later it doesnt get more lucky than me Anonym Speaker Hackfest-2012 - Quebec,Canada Security
Cyber-Espionage: The Power and The Limits of Technology Michel Juneau-katsuya Hackfest-2012 - Quebec,Canada Security
Top Ten Web Defenses Jim Manico Hackfest-2012 - Quebec,Canada Security
House of cards Preparing the unprepared enterprise (red teaming, testing defenses) Rafal wh1t3rabbit Los Hackfest-2012 - Quebec,Canada Security
Fear, loathing & infosec in legal contracts Ben Sapiro Hackfest-2012 - Quebec,Canada Security
La vigie 2.0 applique Benot h. Dicaire Hackfest-2012 - Quebec,Canada Security
Tlcommunication libre: scurit et avancement Nicolas Bouliane Hackfest-2012 - Quebec,Canada Security
Parallle historique entre la scurit prive et celle des TI Marc-andr Blanger Hackfest-2012 - Quebec,Canada Security
Avez-vous dj achet un faux logiciel antivirus? Moi oui! Jean-pier Tablot Hackfest-2012 - Quebec,Canada Security
Ouelette Le printemps Anonymous Jacques Hackfest-2012 - Quebec,Canada Security
Hacking : La revanche du hardware Dimitri Souleliac Hackfest-2012 - Quebec,Canada Security
BYODeception Benot Gurette Hackfest-2012 - Quebec,Canada Security
So, the red team was here and tore us a new one. NOW WHAT? Iftach Ian Amit Hashdays-2012 - Lucerne,Switzerland Security
NFC: I don't think it means what you think it means. Ben April Hashdays-2012 - Lucerne,Switzerland Security
Ghost is in the Air(Traffic) Andrei Costin Hashdays-2012 - Lucerne,Switzerland Security
Things one wants from a Heap Visualization Tool Thomas Dullien Hashdays-2012 - Lucerne,Switzerland Security
NIDS/NIPS Testing Arron ( finux ) Finnon Hashdays-2012 - Lucerne,Switzerland Security
Why your intrusion detection system sucks and what to do about it John ( Four ) Flynn Hashdays-2012 - Lucerne,Switzerland Security
IPv6 Insecurity Revolutions Marc Heuse Hashdays-2012 - Lucerne,Switzerland Security
Reboot, Reconstruct, Revolt: Transitioning to a Modern Approach to Risk Management Alex Hutton Hashdays-2012 - Lucerne,Switzerland Security
Dissecting the Induc Virus Robert Lipovsky Hashdays-2012 - Lucerne,Switzerland Security
Data Correlation - Why keep this valuable information in a corner Xavier Mertens Hashdays-2012 - Lucerne,Switzerland Security
Tactical Surveillance: Look at me now! Chris Nickerson Hashdays-2012 - Lucerne,Switzerland Security
Please insert^H inject more coins Nicolas Oberli Hashdays-2012 - Lucerne,Switzerland Security
Physical Drive-By Downloads Kyle Osborn Hashdays-2012 - Lucerne,Switzerland Security
Breaking SAP Portal Alexander Chastuchin Hashdays-2012 - Lucerne,Switzerland Security
Firewall Rule Reviews - Methodologies and Possibilities Marc Ruef Hashdays-2012 - Lucerne,Switzerland Security
Satellite Hacking: An Introduction Martin Rutishauser Hashdays-2012 - Lucerne,Switzerland Security
A review of the virtual world, cloud and a new sphere in the hacking paradigm Jonathan Sinclair Hashdays-2012 - Lucerne,Switzerland Security
The Security (or Insecurity) of 3rd Party iOS Applications Ilja van Sprundel Hashdays-2012 - Lucerne,Switzerland Security
Open collaboration: the best offence is no defence Maurice Verheesen infosecnl-2012 - JaarbeursUtrecht,Netherlands Security
Defensie Cyber Strategie J.m. folmer Mss infosecnl-2012 - JaarbeursUtrecht,Netherlands Security
Buckle up Security Belt When Enjoying Ride in Android World ------ DroidRide: a lightweight and in-line android malware detection engine Wayne Yan Syscan360-2012 - Bejing, China Security
Reverse engineering of fraudster brain Neyolov Evgeny Syscan360-2012 - Bejing, China Security
Memory corruption exploitation in internet explorer Moti Jospeh Syscan360-2012 - Bejing, China Security
Security engineering and product improvements in the new Office Tom Gallagher Syscan360-2012 - Bejing, China Security
Understanding Windows Kernel Font Scaler Engine Vulnerability Wang Yu Syscan360-2012 - Bejing, China Security
The Info Leak Era on Software Exploitation Fermin J. Serna Syscan360-2012 - Bejing, China Security
Windows Kernel Fuzzing For Beginners Ben Nagy Syscan360-2012 - Bejing, China Security
The Past, Present, and Future of Flash Security Haifei Li Syscan360-2012 - Bejing, China Security
The evolution of Chrome security architecture Huan Ren Syscan360-2012 - Bejing, China Security
Are you ready for Post-PC transition? Let's start with Security. Shall We? Jay Bavisi Hacker Halted-2012 - Miami,USA Security
Hackers: Responsibility and Reality Jack Daniel Hacker Halted-2012 - Miami,USA Security
Solving the Cyber Security Hiring Crisis DHS and the Great Talent Winn Schwartau Hacker Halted-2012 - Miami,USA Security
Strategies for Web Application Security at Scale Jeremiah Grossman Hacker Halted-2012 - Miami,USA Security
BioHacking Richard Thieme Hacker Halted-2012 - Miami,USA Security
Open Source Intelligence What Color Underwear are you wearing today? Jeffrey Bardin Hacker Halted-2012 - Miami,USA Security
Using Information Superiority to win the Cybersecurity Battle Matt Watchinkski Hacker Halted-2012 - Miami,USA Security
"Presenting a Hard Target to Attackers Roadmap to Securing Your Wolfgang Kandek Hacker Halted-2012 - Miami,USA Security
Panel Discussion: How to Make End Users Smarter About Security Tim Greux Hacker Halted-2012 - Miami,USA Security
ITU Presentation & Global CyberLympics Awards Mario maniewicz/jay Bavisi Hacker Halted-2012 - Miami,USA Security
Bulletproof Network Security Gary Miliefsky Hacker Halted-2012 - Miami,USA Security
The Next Generation of DGA-Based Crimeware Gunter Ollmann Hacker Halted-2012 - Miami,USA Security
Go with the Flow: Strategies for Successful Social Engineering Chris Silvers Hacker Halted-2012 - Miami,USA Security
Advanced SQL Injection: IDS/WAF evasion Dave Chronister Hacker Halted-2012 - Miami,USA Security
House of Cards - How not to collapse when bad things happen Rafal wh1t3rabbit Los Hacker Halted-2012 - Miami,USA Security
How to Create an Open Source multi-OS interoperable microSD/USB drive Live Distribution Cameron Camp Hacker Halted-2012 - Miami,USA Security
The Persistent Threat of Mobile Apps Why Continuous Testing is Key John Weinschenk Hacker Halted-2012 - Miami,USA Security
Counter Exploitation of Cyber Threats Sean M. Bodmer Hacker Halted-2012 - Miami,USA Security
Tenacious Diggity Skinny Dippin in a Sea of Bing Francis Brown Hacker Halted-2012 - Miami,USA Security
Winning the Security Awareness Game Jenn Lesser Hacker Halted-2012 - Miami,USA Security
Hacking The Big Four Databases Josh Shaul Hacker Halted-2012 - Miami,USA Security
Advanced Industrial Espionage Attacks Gianni Gnesa Hacker Halted-2012 - Miami,USA Security
What you don't know can hurt you! Ben Miller Hacker Halted-2012 - Miami,USA Security
Building a Live Hacking Target Range Kevin Cardwell Hacker Halted-2012 - Miami,USA Security
Mobile Hardware Hacking with Raspberry Pi Wayne Burke Hacker Halted-2012 - Miami,USA Security
Zombie Browsers, spiced with rootkit extensions Zoltan Balazs Hacker Halted-2012 - Miami,USA Security
Hacking Back In Self-Defense: How Can I Do It Legally? David Willson Hacker Halted-2012 - Miami,USA Security
Attacking Apache Reverse Proxy Prutha Parikh Hacker Halted-2012 - Miami,USA Security
Breaking SAP Portal Dmitry Chastukhin Hacker Halted-2012 - Miami,USA Security
Physical Drive-by Downloads - An Android Modders Weakness Kyle Osborn Hacker Halted-2012 - Miami,USA Security
Architecting and Building a Secure Virtual Infrastructure and Private Rob Randell Hacker Halted-2012 - Miami,USA Security
Security and Software-defined Networks Michael Berman Hacker Halted-2012 - Miami,USA Security
The Cloud Whisperer: What Security Secrets is your Cloud not disclosing? Tim Pierson Hacker Halted-2012 - Miami,USA Security
Bring Your Own Destruction Aamir Lakhani Hacker Halted-2012 - Miami,USA Security
Riding on Cloud 9 Holistic Security for a Euphoric Cloud Experience Freddie Beaver Hacker Halted-2012 - Miami,USA Security
A Perfect Cyber Storm is Brewing and We Are Not Prepared Victor Nappe Hacker Halted-2012 - Miami,USA Security
FedRAMP - How the Feds Plan to Manage Cloud Security Risks Steven f. Fox Hacker Halted-2012 - Miami,USA Security
How to successfully get your Cloud through FedRAMP, PCI, & Hemma Mcandrew Hacker Halted-2012 - Miami,USA Security
Software Threat Modeling for the Cloud Shakeel Tufail Hacker Halted-2012 - Miami,USA Security
Presidential Style Debate Panel for Cloud Security From the world Top Tim Lakhani Hacker Halted-2012 - Miami,USA Security
Military Targeting Adapted for Hacking Rock Stevens Hacker Halted-2012 - Miami,USA Security
Enemy behind the Firewall: Trust, Tools, Threat Richard Ii Hacker Halted-2012 - Miami,USA Security
Exploiting Routers for Fun and Profit Pedro Caldern Hacker Halted-2012 - Miami,USA Security
Creating a Hack Resistant Culture Joan Ross Hacker Halted-2012 - Miami,USA Security
Own the Network - Own the Data Paul Coggin Hacker Halted-2012 - Miami,USA Security
Advanced Persistent Pentesting: Fighting Fire with Fire Jonathan Cran Hacker Halted-2012 - Miami,USA Security
Delivery Is Everything: Case Studies in Presenting Penetration Test Mike Danseglio Hacker Halted-2012 - Miami,USA Security
Security 360 Jesus Consuelos Hacker Halted-2012 - Miami,USA Security
Using HTTP headers pollution for mobile networks attacks Bogdan Alecu Hacker Halted-2012 - Miami,USA Security
DGAs and Cyber-Criminals: A Case Study Christopher Elisan Hacker Halted-2012 - Miami,USA Security
Hacking SCADA Systems - 2011 Year in Review Jonathan Pollet Hacker Halted-2012 - Miami,USA Security
Pentesting with Mercury Tyrone Erasmus ZaCon4-2012 - Johannesburg, South Africa Security
Terrorism, tracking, privacy and human interactions Glenn Wilkinson ZaCon4-2012 - Johannesburg, South Africa Security
Alternatives to stateful packet filtering in R&E networking Simeon Miteff ZaCon4-2012 - Johannesburg, South Africa Security
Anti-malware Technique Evaluator (ATE) - Pwning AVs Manuel Corregedor ZaCon4-2012 - Johannesburg, South Africa Security
Hacking Games (or "why client side logic is bad") Ross Simpson ZaCon4-2012 - Johannesburg, South Africa Security
HTML5 exploits or "Cutting the edge on web development" Joshua ZaCon4-2012 - Johannesburg, South Africa Security
88MPH: Digital tricks to bypass Physical security Andrew Macpherson ZaCon4-2012 - Johannesburg, South Africa Security
Offensive Software Defined Radio Jacques Louw ZaCon4-2012 - Johannesburg, South Africa Security
Security Myths Exposed Marcus Carey Skydogcon-2012 - Nashville,USA Security
Dealing with difficult co-workers: How I became the "Thanks for the candy" guy Spikygeek Skydogcon-2012 - Nashville,USA Security
Pivot2Pcap: a new approach to optimzing cybersecurity operations by tightly coupling the big-picture view provided by Netflow with the in-depth resolving power of PCAP. Peter Shaw Skydogcon-2012 - Nashville,USA Security
Lessons Learned founded and running a Startup Billy Hoffman Skydogcon-2012 - Nashville,USA Security
Your business model is naked and ugly Shane Lawson Skydogcon-2012 - Nashville,USA Security
Gangs and the use of Technology Carter Smith Skydogcon-2012 - Nashville,USA Security
Keynote Mark Hardy Skydogcon-2012 - Nashville,USA Security
RE, CND and Geopolitics, Oh My! Jeff Brown Skydogcon-2012 - Nashville,USA Security
Insanely Great! Curtis Koenig Skydogcon-2012 - Nashville,USA Security
Setting up BackTrack and automating various tasks with bash scripts Lee Baird Skydogcon-2012 - Nashville,USA Security
Bioveillance: The Surreptitious Analysis of Physiological and Behavioral Data noah Schiffman Skydogcon-2012 - Nashville,USA Security
Build a UAV! Sonny Mounicou Skydogcon-2012 - Nashville,USA Security
Lifecycle and Detection of an Exploit Kit Alex Kirk Skydogcon-2012 - Nashville,USA Security
Go With the Flow: Strategies for successful social engineering Chris Silvers Skydogcon-2012 - Nashville,USA Security
Hack your Credit Score; How the System is Flawed Scott Moulton Skydogcon-2012 - Nashville,USA Security
Why Defensive InfoSec Often Fails: Lessons From Chaos Theory Dave Marcus Skydogcon-2012 - Nashville,USA Security
Using the Gaussian Function to Target Awareness and Training Fozzie Skydogcon-2012 - Nashville,USA Security
0-60 in 60 Minutes - An Approach to iOS Application Assessments Nishchal Ramanathan CounterMeasure-2012 - Ottawa,Canada Security
Analysis and Demonstration of a Cisco Call Manager 0-day Hugh Markov CounterMeasure-2012 - Ottawa,Canada Security
Advanced Persistent Response Peleus Uhley CounterMeasure-2012 - Ottawa,Canada Security
Advanced Persistent Threat - Intelligence Brief Ryan Kazanciyan CounterMeasure-2012 - Ottawa,Canada Security
Building Threat Intelligence Nart Villeneuve CounterMeasure-2012 - Ottawa,Canada Security
DNS Sinkhole Active Detection and Blocking of Known Malicious Domains Guy Bruneau CounterMeasure-2012 - Ottawa,Canada Security
doubt, deceit, deficiency & decency - a decade of disillusionment James Arlen CounterMeasure-2012 - Ottawa,Canada Security
Follow the Money - Organized Crime and Money Laundering on the Internet Robert Beggs CounterMeasure-2012 - Ottawa,Canada Security
Impeding Automated Malware Analysis Paul Royal CounterMeasure-2012 - Ottawa,Canada Security
Mapping and Evolution of Android Permissions Zach Reiter CounterMeasure-2012 - Ottawa,Canada Security
Secure Code Review - OWASP TOP 10 Sherif Koussa CounterMeasure-2012 - Ottawa,Canada Security
Security Awareness for Social Media in Business Scott Wright CounterMeasure-2012 - Ottawa,Canada Security
Strategic Application Security Programs in the Enterprise Shyama Rose CounterMeasure-2012 - Ottawa,Canada Security
The Challenges of the Kill Chain Mischel Kwon CounterMeasure-2012 - Ottawa,Canada Security
Using and Extending Vega in Security Testing Web Applications David mirza Ahmad CounterMeasure-2012 - Ottawa,Canada Security
Keynote: Changing the world by refusing to understand you can't Rick Falkvinge t2-2012 - Helsinki, Finland Security
Hacking Huawei VRP Felix ( FX ) Lindner t2-2012 - Helsinki, Finland Security
AbuseHelper: Fighting botnets with botnets Jussi Eronen t2-2012 - Helsinki, Finland Security
Game of Lies Olli-pekka Niemi t2-2012 - Helsinki, Finland Security
PinPadPwn Nils t2-2012 - Helsinki, Finland Security
Secure Exploit Payload Staging Georg Wicherski t2-2012 - Helsinki, Finland Security
Protecting against computerized corporate espionage Jarno Niemel t2-2012 - Helsinki, Finland Security
Draw Me A Trojan Yuval Vadim Polevoy t2-2012 - Helsinki, Finland Security
Finding Flame Costin Raiu t2-2012 - Helsinki, Finland Security
How to root your USB-device Olle Segerdahl t2-2012 - Helsinki, Finland Security
Solving the t2'12 Challenge Timo Hirvonen t2-2012 - Helsinki, Finland Security
SAP Slapping - A pentesters guide Dave Hartley t2-2012 - Helsinki, Finland Security
KEYNOTE: Infosec at Ludicrous Speed: Rugged DevOps and More... Gene H. Kim AppSecUSA-2012 - Austin,USA Security
Building Predictable Systems using Behavioral Security Modeling: Functional Security Requirements John Benninghoff AppSecUSA-2012 - Austin,USA Security
Top Ten Web Defenses Jim Manico AppSecUSA-2012 - Austin,USA Security
Building a Web Attacker Dashboard with ModSecurity and BeEF Ryan C. Barnett AppSecUSA-2012 - Austin,USA Security
Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews Sherif Koussa AppSecUSA-2012 - Austin,USA Security
Cracking the Code of Mobile Application Sreenarayan Ashokkumar AppSecUSA-2012 - Austin,USA Security
Hacking .NET Application: Reverse Engineering 101 Jon Mccoy AppSecUSA-2012 - Austin,USA Security
Doing the unstuck: How Rugged cultures drive Biz & AppSec Value Josh Corman AppSecUSA-2012 - Austin,USA Security
KEYNOTE: Securing JavaScript by Douglas Crockford Douglas Crockford AppSecUSA-2012 - Austin,USA Security
Hacking with WebSockets Vaagn Toukharian AppSecUSA-2012 - Austin,USA Security
AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life Jerry Hoff AppSecUSA-2012 - Austin,USA Security
How we tear into that little green man Matthew Rowley AppSecUSA-2012 - Austin,USA Security
Exploiting Internal Network Vulns via the Browser using BeEF Bind Michele Orru AppSecUSA-2012 - Austin,USA Security
Demystifying Security in the Cloud: AWS Scout Jonathan Chittenden AppSecUSA-2012 - Austin,USA Security
I>S+D! - Interactive Application Security Testing (IAST), Beyond SAST/DAST Ofer Maor AppSecUSA-2012 - Austin,USA Security
The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code & Server Side Memory Structure of ANY Application (OWASP ZAP extension) Shay Chen AppSecUSA-2012 - Austin,USA Security
Rebooting (secure) software development with continuous deployment Nick Galbreath AppSecUSA-2012 - Austin,USA Security
Cross Site Port Scanning Riyaz Walikar AppSecUSA-2012 - Austin,USA Security
Analyzing and Fixing Password Protection Schemes John Steven AppSecUSA-2012 - Austin,USA Security
Payback on Web Attackers: Web Honeypots Simon Roses Femerling AppSecUSA-2012 - Austin,USA Security
Spin the bottle: Coupling technology and SE for one awesome hack David Kennedy AppSecUSA-2012 - Austin,USA Security
Incident Response: Security After Compromise Richard Bejtlich AppSecUSA-2012 - Austin,USA Security
Effective approaches to web application security Zane Lackey AppSecUSA-2012 - Austin,USA Security
Why Web Security Is Fundamentally Broken Jeremiah Grossman AppSecUSA-2012 - Austin,USA Security
Blended Threats and JavaScript: A Plan for Permanent Network Compromise Phil Purviance AppSecUSA-2012 - Austin,USA Security
Hack your way to a degree: a new direction in teaching application security at universities Konsantinos Papapanagiotou AppSecUSA-2012 - Austin,USA Security
The Same-Origin Saga Brendan Eich AppSecUSA-2012 - Austin,USA Security
NoSQL, no security? Will Urbanski AppSecUSA-2012 - Austin,USA Security
Iran's real life cyberwar Philip Hallam-baker AppSecUSA-2012 - Austin,USA Security
Real World Cloud Application Security Jason Chan AppSecUSA-2012 - Austin,USA Security
Securing the SSL channel against man-in-the-middle attacks: Future technologies - HTTP Strict Transport Security and Pinning of Certs Tobias Gondrom AppSecUSA-2012 - Austin,USA Security
XSS & CSRF with HTML5 - Attack, Exploit and Defense Shreeraj Shah AppSecUSA-2012 - Austin,USA Security
Get off your AMF and dont REST on JSON Dan Kuykendall AppSecUSA-2012 - Austin,USA Security
Unraveling Some of the Mysteries around DOM-Based XSS Dave Wichers AppSecUSA-2012 - Austin,USA Security
The 7 Qualities of Highly Secure Software Mano Paul AppSecUSA-2012 - Austin,USA Security
Web Framework Vulnerabilities Abraham Kang AppSecUSA-2012 - Austin,USA Security
Web App Crypto - A Study in Failure Travis H AppSecUSA-2012 - Austin,USA Security
Origin(al) Sins Alex Russell AppSecUSA-2012 - Austin,USA Security
Using Interactive Static Analysis for Early Detection of Software Vulnerabilities Bill Chu AppSecUSA-2012 - Austin,USA Security
Pining For the Fjords: The Role of RBAC in Today's Applications Wendy Nather AppSecUSA-2012 - Austin,USA Security
Counterintelligence Attack Theory Fred Donovan AppSecUSA-2012 - Austin,USA Security
Top Strategies to Capture Security Intelligence for Applications John Dickson AppSecUSA-2012 - Austin,USA Security
Four Axes of Evil Hd Moore AppSecUSA-2012 - Austin,USA Security
Cloud, Mobility and Security, Oh My! Linda Cureton CybersecurityConferenceandExpo-2012 - Washington,USA Security
Cloud Apotheosis Dawn Meyerriecks CybersecurityConferenceandExpo-2012 - Washington,USA Security
Your Strategy. Your Cloud. Your Choice. Peter Doolan CybersecurityConferenceandExpo-2012 - Washington,USA Security
Protection throughout the Network - Mobile Strategies Rodney Dilts CybersecurityConferenceandExpo-2012 - Washington,USA Security
Overcoming Cloud Challenges...Security, Contracts, Networks and Workforce for success in your Agency! Joseph Klimavicz CybersecurityConferenceandExpo-2012 - Washington,USA Security
Current Challenges of Implementing USG Insider Threat Programs David Vincent CybersecurityConferenceandExpo-2012 - Washington,USA Security
Accelerate Performance and Drive Best Practices in the Cloud Sameer Kalbag CybersecurityConferenceandExpo-2012 - Washington,USA Security
THE FUTURE OF SOCIAL ENGINEERING Sharon Conheady Hack.Lu-2012 - Dommeldange,Luxembourg Security
SECURITY DEVELOPMENT LIFECYCLE TOOLS Ivan Medved Hack.Lu-2012 - Dommeldange,Luxembourg Security
SATELLITE PHONE - AN ANALYSIS OF THE GMR-1 AND GMR-2 STANDARDS Benedikt Driessen Hack.Lu-2012 - Dommeldange,Luxembourg Security
MEMORY CORRUPTION EXPLOITATION IN INTERNET EXPLORER Moti Joseph Hack.Lu-2012 - Dommeldange,Luxembourg Security
SONY READER HACKING STORY Igor Skochinsky Hack.Lu-2012 - Dommeldange,Luxembourg Security
GOTO:HACK IOS APPLICATIONS - DOES YOUR COMPANY DATA ARE SAFE WHEN STORED ON IDEVICES ? Mathieu Renard Hack.Lu-2012 - Dommeldange,Luxembourg Security
BUSTER : ANDROID SECURITY Atul Alex Hack.Lu-2012 - Dommeldange,Luxembourg Security
SOCIAL ENGINEERING Walter Belgers Hack.Lu-2012 - Dommeldange,Luxembourg Security
REMOTELY CRASHING HLR OR WHY IT TOOK TELECOM INDUSTRY 20 YEARS TO RECOGNIZE THE PROBLEMS WITH SS7 Philippe Langlois Hack.Lu-2012 - Dommeldange,Luxembourg Security
HUGO CARON MALWARE.LU OVERVIEW Paul Rascagnres Hack.Lu-2012 - Dommeldange,Luxembourg Security
CYPHERPUNKS WRITE CODE: HACKING ON TOR Arturo Filast Hack.Lu-2012 - Dommeldange,Luxembourg Security
MY LIFE AS AN INTERNATIONAL ARMS DEALER - SOCIAL ENGINEERING AND THE PSYCHOLOGY OF ANONYMITY Wil Allsopp Hack.Lu-2012 - Dommeldange,Luxembourg Security
THE LAYER-2 INSECURITIES OF IPV6 AND THE MITIGATION TECHNIQUES Eric Vyncke Hack.Lu-2012 - Dommeldange,Luxembourg Security
ENISA STUDY OUTCOME OF "EARLY WARNING: STUDY ON HONEYPOTS" Cosmin Ciobanu Hack.Lu-2012 - Dommeldange,Luxembourg Security
REAL-TIME NETWORK FORENSICS USING POM-NG Guy Martin Hack.Lu-2012 - Dommeldange,Luxembourg Security
BOFH MEETS SYSTEMTAP Adrien Kunysz Hack.Lu-2012 - Dommeldange,Luxembourg Security
SINFP3: MORE THAN A COMPLETE FRAMEWORK FOR OPERATING SYSTEM FINGERPRINTING Patrice Auffret Hack.Lu-2012 - Dommeldange,Luxembourg Security
THE OFFICE DEMON: MINOS Jonathan Dechaux Hack.Lu-2012 - Dommeldange,Luxembourg Security
SHODAN: GLOBAL LOGFILE OF INSECURITY Eireann Leverett Hack.Lu-2012 - Dommeldange,Luxembourg Security
WHITE HAT SHELLCODE Didier Stevens Hack.Lu-2012 - Dommeldange,Luxembourg Security
FIREFOX OS APPLICATION SECURITY Paul Theriault Ruxcon-2012 - Melbourne, Australia Security
HOMEBREW DEFENSIVE SECURITY - TAKE MATTERS INTO YOUR OWN HANDS Mimeframe Ruxcon-2012 - Melbourne, Australia Security
THE 3 RINGS OF THE DATA BREACH CIRCUS Mark Goudie Ruxcon-2012 - Melbourne, Australia Security
THE IMPACTS OF ADVANCING TECHNOLOGY ON COMPUTER FORENSICS AND E-DISCOVERY Adam Daniel Ruxcon-2012 - Melbourne, Australia Security
MONITORING REPOSITORIES FOR FUN AND PROFIT Louis Nyffenegger Ruxcon-2012 - Melbourne, Australia Security
EXAMINATION OF THE VMWARE ESXI BINARY PROTOCOL USING CANAPE Alex Chapman Ruxcon-2012 - Melbourne, Australia Security
PIP: REMOTELY INJECTING PHY-LAYER PACKETS WITHOUT A BUG OR YOUR RADIO Travis Goodspeed Ruxcon-2012 - Melbourne, Australia Security
DR STRANGELOCK ...OR: HOW I LEARNED TO STOP WORRYING AND LOVE THE KEY Graeme Wily Bell Ruxcon-2012 - Melbourne, Australia Security
BLUETOOTH PACKET SNIFFING USING PROJECT UBERTOOTH Dominic Spill Ruxcon-2012 - Melbourne, Australia Security
DEFIBRILLATING WEB SECURITY Meder Kydyraliev Ruxcon-2012 - Melbourne, Australia Security
DETECTING SOURCE CODE RE-USE THROUGH METADATA AND CONTEXT PARTIAL HASHING Daniel Cabezas Ruxcon-2012 - Melbourne, Australia Security
HARDWARE BACKDOORING IS PRACTICAL Jonathan Brossard Ruxcon-2012 - Melbourne, Australia Security
OPERATION DAMARA & OPERATION CRAFT Alex Tilley Ruxcon-2012 - Melbourne, Australia Security
BINARY INSTRUMENTATION FOR ANDROID Collin Mulliner Ruxcon-2012 - Melbourne, Australia Security
A TALE OF TWO FIREFOX BUGS Fionnbharr Davies Ruxcon-2012 - Melbourne, Australia Security
Cloud-Assisted Security Ruby b. Lee CCSW-2012 - Raleigh,USA Security
Keynote I Srdjan Capkun CCSW-2012 - Raleigh,USA Security
What If We Got A Do-Over? Howard shrobe (darpa) CCSW-2012 - Raleigh,USA Security
Keynote II Radu Sion CCSW-2012 - Raleigh,USA Security
Practical Applications of Homomorphic Encryption Kristin Research) CCSW-2012 - Raleigh,USA Security
Keynote III Seny Kamara CCSW-2012 - Raleigh,USA Security
Revisiting DNS and WHOIS in the Cloud Era Burt Kaliski CCSW-2012 - Raleigh,USA Security
Keynote: Hacking Survival Larry Pesce Hack3rCon3-2012 - Charleston,USA Security
Next Generation Web Reconnaissance Time Tomes Hack3rCon3-2012 - Charleston,USA Security
Hardware Hacking Village - Day 1 Ronin Hack3rCon3-2012 - Charleston,USA Security
Intro to Network Traffic Analysis Jon Schipp Hack3rCon3-2012 - Charleston,USA Security
Automated Spear-twishing - It was only a matter of time Sean Palka Hack3rCon3-2012 - Charleston,USA Security
In case of ZOMBIES break glass Chris Hack3rCon3-2012 - Charleston,USA Security
Secrets of Running a Consulting Business Brian Martin Hack3rCon3-2012 - Charleston,USA Security
CTF brought to you by the XRG [START] John Degruyter Hack3rCon3-2012 - Charleston,USA Security
Bash Scripting 101 for Pen Testers Lee Baird Hack3rCon3-2012 - Charleston,USA Security
Special Viewing of REBOOT Smartenupinternet Hack3rCon3-2012 - Charleston,USA Security
Keynote: Finding the MacGyver in You William a. Minear Hack3rCon3-2012 - Charleston,USA Security
EMP, yeah you know me.. Adrian Crenshaw Hack3rCon3-2012 - Charleston,USA Security
Intro to Linux exploit development - Part 1 John Degruyter Hack3rCon3-2012 - Charleston,USA Security
New Media Journalism 101 [Workshop][SOLDOUT] Keri Potipcoe Hack3rCon3-2012 - Charleston,USA Security
WVSU-EDC and DigiSo - 24 Hour - Hack-A-Thon 304geeks Hack3rCon3-2012 - Charleston,USA Security
Build a Glitch Ronin Hack3rCon3-2012 - Charleston,USA Security
Intro to Linux exploit development - Part 2 John Degruyter Hack3rCon3-2012 - Charleston,USA Security
DNS Reconnaissance Carlos Perez Hack3rCon3-2012 - Charleston,USA Security
The Secret Sauce David Kennedy Hack3rCon3-2012 - Charleston,USA Security
You can't Buy Security Boris Sverdlik Hack3rCon3-2012 - Charleston,USA Security
Social Engineering Applied: Exploit the Target Keith Pachulski Hack3rCon3-2012 - Charleston,USA Security
Key Impression Contest Brian Martin Hack3rCon3-2012 - Charleston,USA Security
Leveraging The Glitch Attack Platform Ronin Hack3rCon3-2012 - Charleston,USA Security
From Patch to Pwnd Deral Heiland Hack3rCon3-2012 - Charleston,USA Security
Building a pad that will survive the times Branden Miller Hack3rCon3-2012 - Charleston,USA Security
Can your computer do what Colombo did? Mine can! Fred Cohen TheComputerForensicsShow-2012 - San Francisco,USA Security
Cyber Warfare Techniques and the Effects on the Private Sector Anthony p. Castillo TheComputerForensicsShow-2012 - San Francisco,USA Security
Risking it All Sara Putnam TheComputerForensicsShow-2012 - San Francisco,USA Security
Vendor Red Flags Gregory l Taylor TheComputerForensicsShow-2012 - San Francisco,USA Security
Protecting Your Investment In Cyber Technology Michael Atkins TheComputerForensicsShow-2012 - San Francisco,USA Security
Utilizing Forensic Accounting to Investigate the Financing of Criminal Organizations Desiree Mcgovern TheComputerForensicsShow-2012 - San Francisco,USA Security
Predictive Coding Chris Paskach TheComputerForensicsShow-2012 - San Francisco,USA Security
Crime Scene to Courtroom - Preserving Digital Evidence One Step at a Time Joseph Caruso TheComputerForensicsShow-2012 - San Francisco,USA Security
Fraud Guido van Drunen TheComputerForensicsShow-2012 - San Francisco,USA Security
Disruptive Approaches to Battling Malware in the Cloud (Not Your Grandmas Antivirus) Zulfikar Ramzan TheComputerForensicsShow-2012 - San Francisco,USA Security
Navigating the Social Media Storm: Surviving and thriving in a social media and cloud based world Jack Halprin TheComputerForensicsShow-2012 - San Francisco,USA Security
Risks and Liabilities In Cyberspace Eric j. Sinrod TheComputerForensicsShow-2012 - San Francisco,USA Security
Self Collection: Legal Risks, Challenges & Possibilities John Wilson TheComputerForensicsShow-2012 - San Francisco,USA Security
Inside the Mind of a Hacker Dave Chronister TheComputerForensicsShow-2012 - San Francisco,USA Security
HACKING HUMANS Barnaby Jack Breakpoint-2012 - Melbourne,Australia Security
BINARY INSTRUMENTATION FOR ANDROID Collin Mulliner Breakpoint-2012 - Melbourne,Australia Security
RADIUM: AUTO DATA COLLECTION & VISUALIZATION IN MALTEGO Roelof ( RT ) Temmingh Breakpoint-2012 - Melbourne,Australia Security
MAVERICK: ADDING THE APPLE TOUCH TO QUALCOMM'S BASEBAND BOOTROM Eric McDonald Breakpoint-2012 - Melbourne,Australia Security
THE CASE FOR SEMANTICS-BASED METHODS IN REVERSE ENGINEERING Rolf Rolles Breakpoint-2012 - Melbourne,Australia Security
{Malandroid} - The Crux of Android Infections Aditya K Sood ToorCon-2012 - San Diego,USA Security
PE Alchemy with PEEL Frank2 ToorCon-2012 - San Diego,USA Security
Mobile Device attack graphs for fun and profit Jimmy Shah ToorCon-2012 - San Diego,USA Security
Programming Weird Machines with ELF Metadata "rebecca 'bx' Shapiro" ToorCon-2012 - San Diego,USA Security
Microsoft SQL Server Post-Exploitation - When Databases Attack *NEW* "rob 'whitey' Beck" ToorCon-2012 - San Diego,USA Security
Privacy at the Handset: New FCC Rules? Valkyrie ToorCon-2012 - San Diego,USA Security
Hacking Measured Boot and UEFI Dan Griffin ToorCon-2012 - San Diego,USA Security
How I Learned To Stop Worrying and Love The Smart Meter N/a ToorCon-2012 - San Diego,USA Security
Hacking with WebSockets Vaagn Toukharian ToorCon-2012 - San Diego,USA Security
You Can't Buy Security: Building the Open Source Information Security Program Boris Sverdlik ToorCon-2012 - San Diego,USA Security
When Cell Towers Become Too Smart For Their Own Good Drew "redshift" Porter ToorCon-2012 - San Diego,USA Security
Taming the Robots - Enhancing Security of Mobile Devices with Multiple Personalities Matthias Lange ToorCon-2012 - San Diego,USA Security
The Long Tail of the Internet (the shodan firehose talk) Dan Tentler ToorCon-2012 - San Diego,USA Security
I Am Jack's Heart Monitor Mike Ryan ToorCon-2012 - San Diego,USA Security
War Dialing Like A Boss Jiffy Pop ToorCon-2012 - San Diego,USA Security
Defeating password safes Joseph Giron ToorCon-2012 - San Diego,USA Security
Malware by traditional mail Konstantin Sapronov ToorCon-2012 - San Diego,USA Security
#Internetkillswitch... Come At Me Bro Drew "redshift" Porter ToorCon-2012 - San Diego,USA Security
Building the Next Generation of Computer Security Professionals Chris Simpson ToorCon-2012 - San Diego,USA Security
Teaching your WAF new tricks Robert Rowley ToorCon-2012 - San Diego,USA Security
Accessibility and Security or: How I Learned to Stop Worrying and Love the Halting Problem Anna Shubina ToorCon-2012 - San Diego,USA Security
Stop Patching, for Stronger PCI Compliance Adam Brand ToorCon-2012 - San Diego,USA Security
Truly Effective Social Engineering 2012 ? Now with 20% More Meat! Shane Macdougall ToorCon-2012 - San Diego,USA Security
The New Age of Community Driven Distributed Computing Dean Pierce ToorCon-2012 - San Diego,USA Security
OPSEC "robb O'driscoll" ToorCon-2012 - San Diego,USA Security
To get your malware noticed: target all the police forces in Europe Loucif Kharouni ToorCon-2012 - San Diego,USA Security
Meshing stuff up: AdHoc mesh networks with Android Josh "m0nk" Thomas ToorCon-2012 - San Diego,USA Security
Almost everything you ever wanted to know about the Blackhole Exploit Kit Julia Wolf ToorCon-2012 - San Diego,USA Security
Taking off the Costume: How Mobile Apps Pretend to be Secure Dan Kuykendall ToorCon-2012 - San Diego,USA Security
Physical Drive-By Downloads Kos ToorCon-2012 - San Diego,USA Security
An Insider's Look: WAF and Identity and Access Management Integration Barracuda Networks OWASP BASC-2012 - Cambridge,USA Security
CTF Ming Chow OWASP BASC-2012 - Cambridge,USA Security
Hiding Inside the "Real-Time Web" (to Take-Over the DMZ) Matt Wood OWASP BASC-2012 - Cambridge,USA Security
Metasploit Fundamental Elements - Course 1 Roy Wattanasin OWASP BASC-2012 - Cambridge,USA Security
Metasploit Continued - Course 2 Roy Wattanasin OWASP BASC-2012 - Cambridge,USA Security
Offensive Mobile Forensics Joey Peloquin OWASP BASC-2012 - Cambridge,USA Security
Secure Password Storage: Increasing Resistance to Brute Force Attacks Scott Matsumoto OWASP BASC-2012 - Cambridge,USA Security
Securing Mobile Apps - Threat Modeling, Whitebox, Blackbox testing Greg Wolford OWASP BASC-2012 - Cambridge,USA Security
Streamlining Application Vulnerability Management: Communication Between Development and Security Teams Brian Mather OWASP BASC-2012 - Cambridge,USA Security
Top Ten Web Defenses Jim Manico OWASP BASC-2012 - Cambridge,USA Security
So You Want to Be a Cyber Spook - Open Source Intelligence Jeff Bardin Hacktivity-2012 - Budapest, Hungary Security
Cyberspace and Beyond Evolution in Action David Pepper Hacktivity-2012 - Budapest, Hungary Security
Impressioning Tams Vradi Hacktivity-2012 - Budapest, Hungary Security
Security Code Review Krisztin Schffer Hacktivity-2012 - Budapest, Hungary Security
Security Problems at Hungarian everydays Kos Subecz Hacktivity-2012 - Budapest, Hungary Security
Digipass Instrumentation for Fun and Profit Adrian Furtuna Hacktivity-2012 - Budapest, Hungary Security
Zombie Browsers, spiced with rootkit extensions Zoltn Balzs Hacktivity-2012 - Budapest, Hungary Security
Top 10 most interesting SAP vulnerabilities and attacks Alexander mikhailovich Polyakov Hacktivity-2012 - Budapest, Hungary Security
Paypass vulnerabilities Balzs Bucsay Hacktivity-2012 - Budapest, Hungary Security
Neutralizing an AntiVirus program Andrs Tevesz Hacktivity-2012 - Budapest, Hungary Security
Think differently about database hacking Presentation Lszl Spala Hacktivity-2012 - Budapest, Hungary Security
The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code & Server Side Structure of ANY Application Shay Chen Hacktivity-2012 - Budapest, Hungary Security
Attacking The First Hop Redundancy Tams Szkely Hacktivity-2012 - Budapest, Hungary Security
The security and vulnerability of the biometry Csaba Otti Hacktivity-2012 - Budapest, Hungary Security
Chip-tweet, alternative usage of PKI devices Ron Szab Hacktivity-2012 - Budapest, Hungary Security
The Rise and Fall of DDoS Attacks in 2012 Steve Mulhearn Hacktivity-2012 - Budapest, Hungary Security
USB = Universal Security Bug? Andrs Veres-szentkirlyi Hacktivity-2012 - Budapest, Hungary Security
NAT Attack Sndor Nagy Hacktivity-2012 - Budapest, Hungary Security
Alternative internet Lszl Bir Hacktivity-2012 - Budapest, Hungary Security
Amy Farrah Fowler, or the geek girl's case with the tiara Judit Varga Hacktivity-2012 - Budapest, Hungary Security
Software Threat Modeling Shakeel Tufail Hacktivity-2012 - Budapest, Hungary Security
Big Bang Theory: The Evolution of Pentesting High Security Environments Joe Mccray Hacktivity-2012 - Budapest, Hungary Security
Give me a phone that cant be traced Domonkos Tomcsanyi Hacktivity-2012 - Budapest, Hungary Security
Android Security - An Introduction Antonio Somogyvari Hacktivity-2012 - Budapest, Hungary Security
To secure data is to prepare for jailbreak Zsombor Kovcs Hacktivity-2012 - Budapest, Hungary Security
What Makes the Analysis of Malware Like Duqu or Flame Different? Boldizsr Bencsth Hacktivity-2012 - Budapest, Hungary Security
Hunting and exploiting bugs in kernel drivers Andrs Kabai Hacktivity-2012 - Budapest, Hungary Security
Self Defending Database Alexander Kornbrust Hacktivity-2012 - Budapest, Hungary Security
Spot the Web Vulnerability Miroslav Stampar Hacktivity-2012 - Budapest, Hungary Security
Journey to the bottom of a black hole Gbor Szappanos