- DEF CON 19 - Abstrct - When Space Elephants Attack: A DEFCON Challenge for Database Geeks
- DEF CON 19 - Adam Baldwin - Pillaging DVCS Repos For Fun And Profit
- DEF CON 19 - Adrian Crenshaw "Irongeek" - Cipherspaces/Darknets
- DEF CON 19 - Alexander Kornbrust - Hacking and Securing DB2 LUW Databases
- DEF CON 19 - Alva 'Skip' Duckwall - A Bridge Too Far: Defeating Wired 802.1x
- DEF CON 19 - Andrew Gavin - Gone in 60 Minutes: Stealing Sensitive Data
- DEF CON 19 - Andrew Wilson, Michael Brooks - Traps of Gold
- DEF CON 19 - Artem Dinaburg - Bit-squatting: DNS Hijacking Without Exploitation
- DEF CON 19 - Aseem "@" Jakhar - Jugaad - Linux Thread Injection Kit
- DEF CON 19 - Ben Feinstein, Jeff Jarmoc - "Get Off of My Cloud"
- DEF CON 19 - Brad Woodberg - Network Application Firewalls: Exploits and Defense
- DEF CON 19 - Brian Kennish - Tracking the Trackers
- DEF CON 19 - Bruce "Grymoire" Barnett - Deceptive Hacking
- DEF CON 19 - Bruce Sutherland - How To Get Your Message Out
- DEF CON 19 - Carey, Rude, and Vandevanter - Metasploit vSploit Modules
- DEF CON 19 - Charlie Miller - Battery Firmware Hacking
- DEF CON 19 - Chema Alonso, Juan Garrido "Silverhack" - Bosses love Excel, Hackers too.
- DEF CON 19 - Chema Alonso, Juan Garrido "Silverhack" - Dust
- DEF CON 19 - Christopher Cleary - Operational Use of Offensive Cyber
- DEF CON 19 - Daniel Crowley - Speaking with Cryptographic Oracles
- DEF CON 19 - Daniel Garcia - UPnP Mapping
- DEF CON 19 - Dan Kaminsky - Black Ops of TCP/IP 2011
- DEF CON 19 - Dan Rosenberg - Owned Over Amateur Radio
- DEF CON 19 - datagram - Introduction to Tamper Evident Devices
- DEF CON 19 - Dave Kennedy (ReL1K) - Hacking Your Victims Over Power Lines
- DEF CON 19 - David Litchfield - Hacking and Forensicating an Oracle Database Server
- DEF CON 19 - David M. N. Bryan, Luiz Eduardo - Building The DEF CON Network
- DEF CON 19 - Deral Heiland - From Printer To Pwnd
- DEF CON 19 - Deviant Ollam - Safe to Armed in Seconds
- DEF CON 19 - Emmanuel Bouillon - Federation and Empire
- DEF CON 19 - Engebretson & Pauli - Mamma Dont Let Your BabiesGrow Up to be Pen Testers
- DEF CON 19 - Eric Fulton - Cellular Privacy: A Forensic Analysis of Android Network Traffic
- DEF CON 19 - eskimo - Steganography and Cryptography 101
- DEF CON 19 - Eston, Abraham, and Johnson - Dont Drop the SOAP
- DEF CON 19 - Foofus - Handicapping the US Supreme Court
- DEF CON 19 - Ganesh Devarajan, Don LeBert - VDLDS - All Your Voice Are Belong To Us
- DEF CON 19 - George Chamales - Lives On The Line
- DEF CON 19 - Grayson Lenik - I'm Your MAC(b)Daddy
- DEF CON 19 - Greg Conti - The Art and Science of Security Research
- DEF CON 19 - Gregory Pickett - Port Scanning Without Sending Packets
- DEF CON 19 - Gus Fritschie, Mike Wright - Getting F***** On the River
- DEF CON 19 - Holst Swende, and Karlsson - Web Application Analysis With Owasp Hatkit
- DEF CON 19 - James "Myrcurial" Arlen - Security When Nano Seconds Count
- DEF CON 19 - Jamie Butler - Physical Memory Forensics for Cache
- DEF CON 19 - Jason Ostrom - VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP
- DEF CON 19 - Jason Scott - Archive Team: A Distributed Preservation of Service Attack
- DEF CON 19 - Jayson E. Street - Steal Everything, Kill Everyone, Cause Total Financial Ruin!
- DEF CON 19 - Jeff Bryner - Kinectasploit: Metasploit Meets Kinect
- DEF CON 19 - Jimmy Shah - Mobile App Moolah: Profit taking with Mobile Malware
- DEF CON 19 - Joey Maresca - We're (The Government) Here To Help
- DEF CON 19 - Joey Zhu - Phishing and Online Scam in China
- DEF CON 19 - John McNabb - Vulnerabilities of Wireless Water Meter Networks
- DEF CON 19 - Jon McCoy - Hacking .Net Applications: The Black Arts
- DEF CON 19 - Josh Phillips - Hacking MMORPGs for Fun and Mostly Profit
- DEF CON 19 - Jos Weyers - Key Impressioning
- DEF CON 19 - Justin Searle - Attacking and Defending the Smart Grid
- DEF CON 19 - Katy Levinson - Don't Fix It In Software
- DEF CON 19 - Kees Cook - Kernel Exploitation Via Uninitialized Stack
- DEF CON 19 - Kenneth Geers - Strategic Cyber Security
- DEF CON 19 - Kyle 'Kos' Osborn, Matt Johanson - Hacking Google Chrome OS
- DEF CON 19 - Lai, Wu, and Chiu - PK Balancing The Pwn Trade Deficit APT Secrets in Asia
- DEF CON 19 - Lawson, Potter, and Deviant Ollam - And Thats How I Lost My Eye
- DEF CON 19 - Mahmud Ab Rahman - Sneaky PDF
- DEF CON 19 - Marcus J. Carey, David Rude and Will Vandevanter - Metasploit vSploit Modules
- DEF CON 19 - Marketa Trimble - The Future of Cybertravel
- DEF CON 19 - Matt 'openfly' Joyce - The Art of Trolling
- DEF CON 19 - Matt Krick "DCFluX" - DCFluX in: License to Transmit
- DEF CON 19 - Matt "scriptjunkie" Weeks - Network Nightmare: Ruling The Nightlife
- DEF CON 19 - Michael "theprez98" Schearer - WTF Happened to the Constitution?!
- DEF CON 19 - Michael Robinson - What Time Are You Anyway?
- DEF CON 19 - Michael Scarito - Build your own Synthetic Aperture Radar
- DEF CON 19 - Mike Arpaia and Ted Reed - Beat to 1337
- DEF CON 19 - Mikko H. Hypponen - The History and Evolution of Computer Viruses
- DEF CON 19 - Ming Chow - Abusing HTML5
- DEF CON 19 - Mouse and Renderman - Familiarity Breeds Contempt
- DEF CON 19 - Moxie Marlinspike - SSL And The Future Of Authenticity
- DEF CON 19 - Nelson Elhage - Virtualization under attack
- DEF CON 19 - Nicholas J. Percoco, Jibran Ilyas - Malware Freak Show 3
- DEF CON 19 - Nicholas J. Percoco, Paul Kehrer - Getting SSLizzard
- DEF CON 19 - Nicholas J. Percoco, Sean Schulte - This is REALLY not the droid you're looking for...
- DEF CON 19 - Olivier Bilodeau - Fingerbank - Open DHCP Fingerprints Database
- DEF CON 19 - Olivier Bilodeau - PacketFence, The Open Source Nac
- DEF CON 19 - Panel - Ask EFF: The Year in Digital Civil Liberties
- DEF CON 19 - Panel - DEF CON Comedy Jam IV, A New Hope For The Fail Whale
- DEF CON 19 - Panel - Former Keynotes - The Future
- DEF CON 19 - Panel - Is it 0-day or 0-care?
- DEF CON 19 - Panel - Meet The Federal Agent 2.0
- DEF CON 19 - Panel- Net Neutrality Panel
- DEF CON 19 - Panel - Network Security Podcast
- DEF CON 19 - Panel - PCI 2.0: Still Compromising Controls and Compromising Security
- DEF CON 19 - Panel - Represent! Defcon Groups, Hackerspaces, and You.
- DEF CON 19 - Panel - SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas
- DEF CON 19 - Panel - Smartfuzzing The Web: Carpe Vestra Foramina
- DEF CON 19 - Panel- Whoever Fights Monsters Aaron Barr Anonymous and Ourselves
- DEF CON 19 - Paul Craig - Internet Kiosk Terminals : The Redux
- DEF CON 19 - Phil Cryer - Taking Your Ball And Going Home
- DEF CON 19 - Ramon Gomez - Bulletproofing The Cloud: Are We Any Closer To Security?
- DEF CON 19 - Robert "Hackajar" Imhoff-Dousharm - Economics of Password Cracking in the GPU Era
- DEF CON 19 - Shrdlu - Are You In Yet? The CISO's View of Pentesting
- DEF CON 19 - Whitfield Diffie and Moxie Marlinspike