The Impossibility of Protecting the Enterprise at $7.25 an hour 10:00am - 11:00am
I've met the enemy information security and it is us 11:00am - 12:00pm
The Poetry of Secrets: An Introduction to Cryptography 1:00pm - 2:00pm
From X to Totally Pwned 2:00pm - 3:00pm
Introducing User-Centered Design to Augment Human Performance in... 3:00pm - 4:00pm
Back to the Future 4:00pm - 5:00pm
Virtualized Routers Soup to Nuts 5:00pm - 6:00pm
Registration Opens 8:00am - 9:00am
Keynote 9:00am - 10:00am
How I’ve hacked and un-hacked a logic game (20 years to Lights O... 10:00am - 11:00am
Dumping the ROM of the Most Secure Sega Genesis Game Ever Create... 11:00am - 12:00pm
Catered Lunch 12:00pm - 1:00pm
Finding Bad Guys with 35 million Flows, 2 Analysts, 5 Minutes an... 1:00pm - 2:00pm
Multipath TCP - Breaking Today's Networks with Tomorrow's Protoc... 2:00pm - 3:00pm
High Performance Fuzzing 3:00pm - 4:00pm
Cyber Cyber Cyber: Student Security Competitions 4:00pm - 5:00pm
Phishing: Going from Recon to Credentials 5:00pm - 6:00pm