- An Effective Approach to Defense in Depth
- Global Adversarial Capability Modeling
- Go Hack Yourself: 10 Pentest Tactics for Blue Teamers
- Microsoft EMET Overview and Demonstration
- Never Surrender- Reducing Social Engineering Risk
- Robots.txt - There's gold in them thar files
- SMAC & Cloud Security
- Systemic Vulnerabilities
- Welcome to BSidesPGH 2015