• Thursday, May 14
  • The Ghost of Security Past

    Christopher Valasek
    Thu, 11:00 - 11:50
    Track One
  • Synspotting for Teenagers and Real Swinging Adults

    Steve Ocepek
    Thu, 12:00 - 12:50
    Track One
  • Week to Weak: Weaponization of Vulnerabilities

    Nick Espinoza
    Thu, 13:00 - 13:50
    Track One
  • Wanna Cyber?

    Tod Beardsley, egypt
    Thu, 14:00 - 14:50
    Track One
  • Vomiting Shells: Tracking the Splatter Patterns

    Ryan Linn
    Thu, 15:00 - 15:50
    Track One
  • Firmware Vulnerability Analysis

    Jeremy Richards
    Thu, 17:00 - 17:50
    Track One
  • Pwning People Personally

    FuzzyNop
    Thu, 18:00 - 18:50
    Track One
  • Friday, May 15
  • Everything You Need to Know About Crypto in 50 minutes

    Jon Callas
    Fri, 11:00 - 11:50
    Track One
  • The Bad, The Worse, and The Ugly - No Hope for POS Security

    Rob Havelt
    Fri, 12:00 - 12:50
    Track One
  • Cartero - Another Social Engineering Framework

    Matias Brutti
    Fri, 13:00 - 13:50
    Track One
  • Building a Poor Man’s RFID Cloner

    Kevin Bong
    Fri, 15:00 - 15:50
    Track One
  • InfoSec: What we know, and what we need to know.

    Jack Daniel
    Fri, 16:00 - 16:50
    Track One
  • Trojaned Gems - You can’t tell you’re using one!

    Jonathan Claudius, Brandon Myers
    Fri, 17:00 - 17:50
    Track One
  • BREAKING in BAD! (I’m the one who doesn’t knock)

    Jayson E. Street
    Fri, 18:00 - 18:50
    Track One