• Tuesday, April 16
  • Inside the Black Hole Exploit Kit (BHEK)

    Chester Wisniewski
    Tue, 13:00 - 13:50
    Shubert
  • Bring Your Own Device: Keeping it Simple and Effective

    Andrew Jaquith
    Tue, 14:00 - 14:50
    Shubert
  • The Base Rate Fallacy: Information Security Needs To Understand This.

    Patrick Florer
    Tue, 15:30 - 16:20
    Shubert
  • Suicide Risk Assessment and Intervention Tactics

    Amber Baldet
    Tue, 16:30 - 17:30
    Shubert
  • Wednesday, April 17
  • Insider Threat: Hunting for Authorized Evil

    Tom Cross
    Wed, 11:00 - 11:50
    Shubert
  • Analyzing the Chemistry of Data

    Wendy Nather
    Wed, 14:30 - 15:20
    Shubert
  • Hooked on Packets: Reading Pcaps for D students

    Ryan Linn, Mike Ryan
    Wed, 16:00 - 16:50
    Shubert
  • "Hacking Back" is a Bad Idea

    Steven Maske
    Wed, 17:00 - 17:30
    Shubert
  • Thursday, April 18
  • No-Knowledge Crypto Attacks

    Dan Crowley
    Thu, 11:00 - 11:50
    Shubert
  • Adversarial Decision Making in Critical Infrastructure Cyberattacks

    Aunshul Rege
    Thu, 13:30 - 14:20
    Shubert
  • HTTP Header Hunting - A Behavioral Approach to Malware Detection

    Jonathan Claudius, Ben Jackson, Rodrigo Montoro
    Thu, 14:30 - 15:20
    Shubert
  • Attacking NFC Mobile Wallets: Where Trust Breaks Down

    Max Sobell
    Thu, 15:30 - 16:20
    Shubert