Keynote
Neil Wyler
Cryptography Fundamentals
Chris Schiffhauer
Deconstructing The Cyber Kill Chain of Angler Campaign
Artsiom Holub
Developing and Testing an Effective Incident Response Program
Andy Jordan
Diving into 2-factor authentication – a hacker's quick start guide to using the YubiKey
Heisenberg
Easy Mobile Hacking
Aaron Guzman (@scriptingxss)
Fight Fire with Fire: Using Offensive Techniques to Dominate Defense
Danny Quist
Get Hired! (A hiring manager's perspective)
Glen Walker
Hacking for Fun and Profit - Legally
Heather Wilde
Ham Radio - There is more to it than EMCOMM
Tim "NullOverflow" Li
Hipster Frameworks and 0ld 5k00l 3xpl01t5
Seth Law (@sethlaw)
How I Exfiltrate Data From Your Secure Network: Hiding Data in Plain Sight
Joe Gervais (TryCatchHCF)
Httpillage: Calling all Nodes
John Poulin
Hunting Malware with Timelines
Mari DeGrazia
Jams, Cans and Qubes
Kyle Rankin
JoeCrypter, Anti-automated Analysis Crypter
Joe Giron
Leveraging Game Theory and Machine Learning for Proactive Cyber Threat Intelligence
Paulo Shakarian
Machining, A Love Story
XlogicX
PDNS for Pentesters
James Pleger
Real Hacking
Sam Bowne
Reversing and Exploiting Embedded Devices (Walking the software and hardware stack)
Elvis Collado (b1ack0wl)
S.E.R.E. School for Threat Intelligence — Part 1. URL Scanners
Neil Smith
Telling Lies & Making Friends: Penetrating Peoples' Emotional Barriers
Candis Orr and Drew Redshift Porter
The Golden Ticket Attack - A Look Under the Hood
Gerard Laygui
The HeartBrainLungs Theory: Integrating Data Products to InfoSec Programs
Andre Gironda
Tracing “cR3d$”: Tracking the DeepWeb and OSINT gathering
Blake n01 Butler
WTF is Browser Hacking?
Christian Frichot (@xntrik)