• Wednesday, May 18
  • Defending the Cloud from the Full Stack Hack

    Erik Peterson
    Wed, 10:45 - 11:25
    Library - Cloud & IoT
  • How security changes in the cloud and why you care

    Nathan Cooprider
    Wed, 11:35 - 12:15
    Library - Cloud & IoT
  • DGA Antivenom: Stopping new configurations before analysis

    Chip McSweeney
    Wed, 13:30 - 14:10
    Library - Cloud & IoT
  • The Bad Guys Have Your Pacemaker: How to Stop Attacks on Your IoT Devices

    Chris Schmidt
    Wed, 14:20 - 15:00
    Library - Cloud & IoT
  • Toward Consistent, Usable Security Risk Assessment of Medical Devices

    Penny Chase, Steve Christey Coley
    Wed, 15:35 - 16:15
    Library - Cloud & IoT
  • Thursday, May 19
  • Deconstructing The Cyber Kill Chain of Angler Campaign

    Artisom Holub
    Thu, 10:00 - 10:40
    Library - Security & Technology
  • Emerald City of Cyber Security

    Ben Herzberg
    Thu, 10:50 - 11:30
    Library - Security & Technology
  • httpillage: calling all nodes

    John Poulin
    Thu, 11:40 - 12:20
    Library - Security & Technology
  • Why is Network Access Control So Hard? Is there a Better Way?

    Jason Garbis
    Thu, 13:20 - 14:00
    Library - Security & Technology
  • Side Channel Defense with Intel Cache Allocation Technique

    Xiaoning Li, Pei Luo
    Thu, 14:10 - 14:50
    Library - Security & Technology