Venue Open/Registration 8:00am - 9:00am
Coffee 9:00am - 10:00am
Keynote: A Declaration of the Independence of Cyberspace 10:00am - 10:55am
The Tales of a Bug Bounty Hunter 11:00am - 11:55am
TOOOL 11:00am - 6:00pm
Mainframes? On My Internet? 11:00am - 11:55am
Lunch 12:00pm - 1:00pm
Securing the Distributed Workforce 1:00pm - 1:55pm
Reverse Engineering the Wetware: Understanding Human Behav... 1:00pm - 1:55pm
Exploit Development Training & Competition 1:00pm - 6:00pm
Hackers Hiring Hackers - How to hack the job search and ha... 2:00pm - 2:55pm
Who’s Breaking into Your Garden? iOS and OS X Malware You... 2:00pm - 2:55pm
Scan, Pwn, Next! – exploiting service accounts in Windows... 3:00pm - 3:55pm
A year in the wild: fighting malware at the corporate leve... 3:00pm - 3:55pm
Guest to root - How to Hack Your Own Career Path...
Breaking Honeypots for Fun and Profit
Everything Is Awful (And You're Not Helping)
IoT on Easy Mode (Reversing Embedded Devices)
In the crosshairs: the trend towards targeted at...
Why it’s all snake oil – and that may be ok
Developing a Rugged DevOps Approach to Cloud Sec...
Ask the EFF 5:30pm - 5:55pm
Happy Hour 6:00pm - 7:00pm
Digital Intelligence Gathering: Using the Powers of OSINT... 10:00am - 10:55am
TOOOL 10:00am - 5:00pm
Sedating the Watchdog: Abusing Security Products to Bypass... 10:00am - 10:55am
Exploiting Broken Webapps 10:00am - 6:00pm
Sweet Security: Deploying a Defensive Raspberry Pi 11:00am - 11:55am
Sharing is Caring: Understanding and measuring Threat Inte... 11:00am - 11:55am
Planning Effective Red Team Exercises 1:00pm - 1:55pm
The Ransomware Threat: Tracking the Digital Footprints 1:00pm - 1:55pm
Access Control in 2016 - deep dive 2:00pm - 2:55pm
Fraud Detection & Real-time Trust Decisions 2:00pm - 2:55pm
Fuzz Smarter, Not Harder (An afl-fuzz Primer) 3:00pm - 3:55pm
Using Behavior to Protect Cloud Servers 3:00pm - 3:55pm
The Art of the Jedi Mind Trick
Elliptic Curve Cryptography for those who are af...
APT Reports and OPSEC Evolution, or: These are n...
Mobile App Corporate Espionage
Why Can't We Have Nice Things? Conflict Resoluti...
Sucker-punching Malware: A Case Study in Using B...
Employee Hijacking: Building a hacktober awarene...
Advanced techniques for real-time detection of p...