• Wednesday, May 27
  • Adversary Profile: Gothic Panda

    Silas Cutler
    Wed, 10:00 - 10:40
    Library - Security and Technology
  • Penetration Testing in the Cloud

    Dan Lambright
    Wed, 10:50 - 11:30
    Library - Security and Technology
  • Using NLP to detect phishing and APT CnC domains

    Jeremiah O'Connor
    Wed, 11:35 - 12:15
    Library - Security and Technology
  • Growing Up: A Maturity Model and Roadmap for Vulnerability Management

    Eric Cowperthwaite
    Wed, 13:30 - 14:10
    Library - Security and Technology
  • Embedded Insecurity: Can We Fix The Internet of Evil Things?

    Paul Asadoorian
    Wed, 14:20 - 15:00
    Library - Security and Technology
  • Defending the Enterprise with Evernote

    Salvador Grec
    Wed, 15:15 - 15:55
    Library - Security and Technology
  • Thursday, May 28
  • Cognitive Injection

    Andy Ellis
    Thu, 10:00 - 10:40
    Library - Security and Technology
  • Monitoring Social Media in 5 Minutes a Week

    Dakota Nelson
    Thu, 10:50 - 11:30
    Library - Security and Technology
  • Protecting your cloud server with a cloud IDS

    Josh Pyorre
    Thu, 11:35 - 12:15
    Library - Security and Technology
  • Cyber Information Sharing -- A Means, not an End

    Doug Wilson
    Thu, 13:30 - 15:00
    Library - Security and Technology
  • Multipath TCP - Breaking Today's Networks with Tomorrow's Protocols

    Catherine Pearce
    Thu, 15:15 - 15:55
    Library - Security and Technology