• A
  • A Brief History of Physical Security - Schuyler Towne

    Schuyler Towne
    Thu, 14:30 - 15:20
    Washington
  • Adversarial Decision Making in Critical Infrastructure Cyberattacks

    Aunshul Rege
    Thu, 13:30 - 14:20
    Shubert
  • Adversarial Resilience at the Planetary Scale

    Christian Ternus
    Wed, 16:00 - 16:50
    Washington
  • Analyzing the Chemistry of Data

    Wendy Nather
    Wed, 14:30 - 15:20
    Shubert
  • Android App Pitfalls

    Zach Lanier
    Tue, 14:00 - 14:50
    Washington
  • Attacking Cloud Services with Source Code

    Jonathan Claudius
    Tue, 14:00 - 14:50
    Library
  • Attacking NFC Mobile Wallets: Where Trust Breaks Down

    Max Sobell
    Thu, 15:30 - 16:20
    Shubert
  • B
  • Big Data? Big Liability!

    Jake Kouns
    Wed, 17:00 - 17:30
    Washington
  • Birds, bots and machines - Fraud in Twitter and how to detect it using Machine Learning Techniques

    Vicente Diaz
    Wed, 14:30 - 15:20
    Library
  • Blitzing with your Defense

    Ben Jackson
    Thu, 14:30 - 15:20
    Library
  • Bring Your Own Device: Keeping it Simple and Effective

    Andrew Jaquith
    Tue, 14:00 - 14:50
    Shubert
  • Building Your Own Packet Capture Platform

    Dragorn, Mike Kershaw, Michael Ossmann
    Thu, 15:30 - 16:20
    Washington
  • C
  • CANCELLED - An Examination of String Allocations in Internet Explorer 9

    Christopher Valasek
    Tue, 13:00 - 13:50
    Library
  • CANCELLED - I Built My House On Sand - Embedded Security at the Firmware Layer

    Ryan Permeh
    Tue, 14:00 - 14:50
    Washington
  • CANCELLED - Let's Write Some IOS Malware

    Christien Rioux
    Tue, 16:30 - 17:30
    Library
  • Closing Remarks

     
    Thu, 17:30 - 18:00
    Washington
  • "
  • "Cyber" Momentum: Understanding & Leveraging the National Cybersecurity Policy Debate

    Jack Whitsitt
    Wed, 16:00 - 16:50
    Library
  • D
  • Data Analysis and Visualization for Security Professionals

    Jay Jacobs, Bob Rudis
    Thu, 13:30 - 14:20
    Washington
  • Distributed Security: Expanding the Toolkit for Institutional Resilience

    Sandy Carielli, Sam Curry
    Wed, 13:30 - 14:20
    Library
  • F
  • Facilitating Fluffy Forensics (a.k.a. Considerations for Cloud Forensics)

    Dan Geer, Andrew Hay
    Thu, 15:30 - 16:20
    Library
  • Fireside Chat with Dan Geer and Richard Thieme

    Dan Geer, Richard Thieme
    Wed, 10:00 - 10:50
    Washington
  • G
  • Games We Play: Payoffs & Chaos Monkeys

    Allison Miller
    Tue, 13:00 - 13:50
    Washington
  • "
  • "Hacking Back" is a Bad Idea

    Steven Maske
    Wed, 17:00 - 17:30
    Shubert
  • H
  • Herding Lizards: How to avoid Security Subsistence Syndrome

    Andy Ellis
    Thu, 10:00 - 10:50
    Washington
  • Hooked on Packets: Reading Pcaps for D students

    Ryan Linn, Mike Ryan
    Wed, 16:00 - 16:50
    Shubert
  • HTTP Header Hunting - A Behavioral Approach to Malware Detection

    Jonathan Claudius, Ben Jackson, Rodrigo Montoro
    Thu, 14:30 - 15:20
    Shubert
  • I
  • Insider Threat: Hunting for Authorized Evil

    Tom Cross
    Wed, 11:00 - 11:50
    Shubert
  • Inside the Black Hole Exploit Kit (BHEK)

    Chester Wisniewski
    Tue, 13:00 - 13:50
    Shubert
  • J
  • JavaScript Pitfalls

    Ming Chow
    Tue, 15:30 - 16:20
    Library
  • K
  • Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World

    Ed Skoudis
    Thu, 11:00 - 11:50
    Library
  • N
  • No-Knowledge Crypto Attacks

    Dan Crowley
    Thu, 11:00 - 11:50
    Shubert
  • O
  • Opening Keynote

    Gene Kim
    Tue, 12:00 - 12:50
    Washington
  • P
  • Protecting sensitive information on iOS devices

    David Schuetz
    Thu, 13:30 - 14:20
    Library
  • Punch and Counter-punch with .Net Apps

    J. Wolfgang Goerlich
    Wed, 17:00 - 17:30
    Library
  • Pwnie Express presents Practical MitM Pentesting

    Jonathan Cran
    Wed, 13:30 - 14:20
    Washington
  • R
  • Rise in ATM Compromises

    Luiz Eduardo, Ryan Linn, Dos Santos
    Tue, 13:00 - 13:50
    Library
  • S
  • Speed Networking

    Jonathan Cran
    Tue, 16:30 - 17:30
    Washington
  • Strategic Analysis of the iOS Jailbreak Development Community

    Dino Dai Zovi
    Tue, 15:30 - 16:20
    Washington
  • Suicide Risk Assessment and Intervention Tactics

    Amber Baldet
    Tue, 16:30 - 17:30
    Shubert
  • T
  • The Base Rate Fallacy: Information Security Needs To Understand This.

    Patrick Florer
    Tue, 15:30 - 16:20
    Shubert
  • Theory and Application of Realistic Capture the Flag Competitions

    Julian Cohen
    Wed, 11:00 - 11:50
    Washington
  • Third Party Security Assurance: The Service Provider Perspective

    John Nye
    Wed, 11:00 - 11:50
    Library
  • W
  • Wait! Wait! Don't Pwn Me!

     
    Thu, 16:30 - 17:30
    Washington
  • We have seen the future, and it is not pretty

    Chris Wysopal
    Tue, 16:30 - 17:20
    Library