• A
  • Adversary Profile: Gothic Panda

    Silas Cutler
    Wed, 10:00 - 10:40
    Library - Security and Technology
  • All That Cybers Is Not War

    Dr. John Linwood, Brendan O'Connor
    Thu, 13:30 - 15:00
    Shubert - Security and Business
  • A Swift Teardown

    Jared Carlson
    Wed, 14:20 - 15:00
    Washington - Application Security
  • B
  • Before and Beyond the Breach: New Research in the 2015 DBIR

    Bob Rudis
    Thu, 15:15 - 15:55
    Shubert - Security and Business
  • Bugged Files: Is Your Document Telling on You?

    Dan Crowley, Damon Smith
    Wed, 11:35 - 12:15
    Washington - Application Security
  • Building a Hub for Cybersecurity: New England’s Tech Drive

    Charlie Benway, Maria Cirino, Michael Farrell, Chris Wysopal
    Wed, 15:15 - 15:55
    Shubert - Security and Business
  • C
  • Closing Remarks - Thur.

     
    Thu, 16:45 - 17:30
    Empire Ballroom - Keynotes
  • Cognitive Injection

    Andy Ellis
    Thu, 10:00 - 10:40
    Library - Security and Technology
  • Cyber Information Sharing -- A Means, not an End

    Doug Wilson
    Thu, 13:30 - 15:00
    Library - Security and Technology
  • D
  • Defending the Enterprise with Evernote

    Salvador Grec
    Wed, 15:15 - 15:55
    Library - Security and Technology
  • E
  • Embedded Insecurity: Can We Fix The Internet of Evil Things?

    Paul Asadoorian
    Wed, 14:20 - 15:00
    Library - Security and Technology
  • Evolution of Threat

    Steven Baker, Mark Ostrowski
    Wed, 10:00 - 10:40
    Shubert - Security and Business
  • Excavating for Empathy

    Maddi Wallach
    Wed, 13:30 - 15:00
    Shubert - Security and Business
  • F
  • From Tech to Exec (Panel)

    Steven Baker, J. Bendonis, Rob Bheyne, Andy Ellis, Mike Perez
    Thu, 13:30 - 14:10
    Washington - Application Security
  • G
  • Getting the most from your managed security providers

    Josh Feinblum, Wade Woolwine
    Wed, 10:50 - 11:30
    Shubert - Security and Business
  • Growing Up: A Maturity Model and Roadmap for Vulnerability Management

    Eric Cowperthwaite
    Wed, 13:30 - 14:10
    Library - Security and Technology
  • H
  • Hacking the Media for Fun and Profit

    Jen Ellis
    Thu, 10:00 - 11:30
    Washington - Application Security
  • I
  • Improving the State of Healthcare Information Security as a Security Investigator

    Roy Wattanasin
    Thu, 10:50 - 11:30
    Shubert - Security and Business
  • iOS App Analytics VS Privacy: An analysis of the use of analytics

    Guillaume K. Ross
    Wed, 15:15 - 15:55
    Washington - Application Security
  • iROP - Interesting ROP gadgets

    Xiaoning Li
    Wed, 10:00 - 10:40
    Washington - Application Security
  • K
  • Keynote - Thur. Afternoon

    David Kennedy
    Thu, 16:00 - 16:45
    Empire Ballroom - Keynotes
  • Keynote - Thur. Morning

    Suzanne Schwartz, MD
    Thu, 09:00 - 09:45
    Empire Ballroom - Keynotes
  • Keynote - Wed. Afternoon

    Mike Murray, Director, Cyber Security Assessment and Consulting at GE Healthcare
    Wed, 16:00 - 16:45
    Empire Ballroom - Keynotes
  • Keynote - Wed. Morning

    Jim Routh, CISO Aetna
    Wed, 09:00 - 09:45
    Empire Ballroom - Keynotes
  • Know the Enemy: Understanding the Adversarial Mindset

    Lior Div
    Thu, 10:00 - 10:40
    Shubert - Security and Business
  • L
  • Lightning Talks (Vendor Room)

     
    Thu, 15:15 - 15:55
    Washington - Application Security
  • M
  • Monitoring Social Media in 5 Minutes a Week

    Dakota Nelson
    Thu, 10:50 - 11:30
    Library - Security and Technology
  • MQTT, CoAP, and Building Secure Things

    Jack Mannino
    Wed, 13:30 - 14:10
    Washington - Application Security
  • Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols

    Catherine Pearce
    Thu, 15:15 - 15:55
    Library - Security and Technology
  • O
  • Opening Remarks - Thur.

     
    Thu, 08:30 - 09:00
    Empire Ballroom - Keynotes
  • Opening Remarks - Wed.

     
    Wed, 08:30 - 09:00
    Empire Ballroom - Keynotes
  • P
  • Penetration Testing in the Cloud

    Dan Lambright
    Wed, 10:50 - 11:30
    Library - Security and Technology
  • Protecting your cloud server with a cloud IDS

    Josh Pyorre
    Thu, 11:35 - 12:15
    Library - Security and Technology
  • Q
  • Quantifying cyber attacks - to optimize and assess your defense

    Jason Syversen
    Wed, 11:35 - 12:15
    Shubert - Security and Business
  • R
  • Reactive JS Security Testing & Exploitation

    Matt Wood
    Wed, 10:50 - 11:30
    Washington - Application Security
  • S
  • Selling for Security Professionals

    Stephanie Losi
    Thu, 11:35 - 12:15
    Washington - Application Security
  • Speed Networking

    Rob Cheyne, Bob Rudis
    Thu, 14:20 - 15:00
    Washington - Application Security
  • U
  • Using NLP to detect phishing and APT CnC domains

    Jeremiah O'Connor
    Wed, 11:35 - 12:15
    Library - Security and Technology
  • W
  • Who Watches the Watchers? Metrics for Security Strategy.

    Michael Roytman
    Thu, 11:35 - 12:15
    Shubert - Security and Business