- 02 Dropping Docs on Darknets How People Got Caught Adrian Crenshaw
- 03 How Networks are Getting Hacked The Evolution of Network Security Omar Santos
- 04 Building on Device Vulnerabilities Attack Modes for ICS Bryan Singer
- 05 Survival in an Evolving Threat Landscape David Hobbs
- 06 Practical Side Channel Attacks On Modern Browsers Angelo Prado
- 07 IPv6 Attack tools Scott Hogg
- 09 Mobile Forensics and Its App Analysis Dr Charline Nixon
- 10 Keynote How Not to do Security Kellman Meghu
- 11 Baseball Apple Pies and Big Data Security Analytics Shorten the Kill Chain Window Aamir Lakani
- 12 Hijacking Label Switched Networks in the Cloud Paul Coggin
- 13 Shepherds Pi Herding Sheep with a Raspberry Pi Timothy Mulligan
- 14 Radio Hack Shack Security Analysis of the Radio Transmission Paula Januszkiewicz
- 15 IT Security Myths How you are helping your enemy Joe Vest
- 16 Splinter the RAT Attack Creating Custom RATs to Exploit the Network Solomon Sonja
- 17 Policy Defined Segmentation with Metadata Scott Kirby
- 18 Cyber Attack Mitigation Christopher Elisan