- CODE BLUE 2014 : Ben Schmidt & Paul Makowski- Embedded Security in The Land of the Rising Sun
- CODE BLUE 2014 : David Jacoby - How I Hacked My Home
- CODE BLUE 2014 : David Seidman - Microsoft Vulnerability Research: How to be a Finder as a Vendor
- CODE BLUE 2014 : Dongcheol Hong - Drone attack by malware and network hacking
- CODE BLUE 2014 : Hiroshi Shinotsuka - how to avoid the Detection by Malware
- CODE BLUE 2014 : Ilfak Guilfanov - Keynote : The story of IDA Pro
- CODE BLUE 2014 : Inbar Raz - Physical [In]Security: It’s not ALL about Cyber
- CODE BLUE 2014 : Keren Elazari - Keynote : The 5 biggest problems of cyber security
- CODE BLUE 2014 : Kuniyasu Suzaki - DeviceDisEnabler
- CODE BLUE 2014 : Pedro Vilaça - BadXNU, A rotten apple!
- CODE BLUE 2014 : Takahiro Matsuki & Dennis Kengo Oka
- CODE BLUE 2014 : The active use and exploitation of Microsoft's Application Compatibility Framework