• Thursday, May 4
  • Practical optical key-duplication attacks via superresolution sensing

    Ian Kilgore
    Thu, 12:00 - 12:20
    Track 2 - Turbo
  • Cryptography Pitfalls

    John Downey
    Thu, 12:30 - 12:50
    Track 2 - Turbo
  • Hacking your local government

    Will Caruana
    Thu, 13:00 - 13:20
    Track 2 - Turbo
  • TCP Exploits

    Peter Shipley
    Thu, 13:30 - 13:50
    Track 2 - Turbo
  • SQL Server Hacking on Scale using PowerShell

    Scott Sutherland
    Thu, 14:00 - 14:20
    Track 2 - Turbo
  • Borders for Dummies

    Chris Carlis, k3ggy
    Thu, 14:30 - 14:50
    Track 2 - Turbo
  • Cryptocurrencies: You keep using that word, anonymity. I do not think it means what you think it means.

    Benjamin Brown
    Thu, 15:00 - 15:20
    Track 2 - Turbo
  • Why and How to Teach People _Cyber_ Isn't A Thing

    H Kapp-Klote
    Thu, 15:30 - 15:50
    Track 2 - Turbo
  • Transitioning to AWS in a Hurry Without Getting Owned

    Devina Dhawan
    Thu, 17:00 - 17:20
    Track 2 - Turbo
  • TBA

     
    Thu, 17:30 - 17:50
    Track 2 - Turbo
  • Friday, May 5
  • Nothing personal, It's just Skype for Business

    Karl Fosaaen
    Fri, 11:30 - 11:50
    Track 2 - Turbo
  • You did what with SHA1 again?

    VideoMan
    Fri, 12:00 - 12:20
    Track 2 - Turbo
  • Threat Intelligence 101: Separating Signal from Noise

    M4n_in_Bl4ck
    Fri, 12:30 - 12:50
    Track 2 - Turbo
  • Unleashing the Dogs of [Cyber] War

    Natalie Vanatta, Erick Waage
    Fri, 13:00 - 13:20
    Track 2 - Turbo
  • Finding Your Way to Domain Admin Access and Even So, the Game Isn't Over Yet.

    Michael Gianarakis, Keith Lee
    Fri, 13:30 - 13:50
    Track 2 - Turbo
  • Something to hide - Why privacy matters and how to get yours back

    Phil Gawron
    Fri, 14:00 - 14:20
    Track 2 - Turbo
  • Why We Fight: A Call to Cyber Service

    Beau Woods
    Fri, 14:30 - 14:50
    Track 2 - Turbo