TakeDownCon Rocket City: Cyber Security via Technology Fails by Jeremy Conway
TakeDownCon Rocket City: Bending and Twisting Networks by Paul Coggin
TakeDownCon Rocket City: WebShells by Adrian Crenshaw
TakeDownCon Rocket City: Technology Deathmatch, The arms race is on by Sean Bodmer
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security researchers face preforming actionable OSINT by Christopher Barber
League of legends is hacked, with crucial user info accessed
Hacker Halted 2014 - EMM Limits & Solutions
Hacker Halted 2014 - How to create permanent Domain Administrator privilege (Mimikatz: Golden Ticket)
Hacker Halted 2014 - Reverse Engineering the Android OS
Hacker Halted 2014 - Why Botnet Takedowns Never Work, Unless It’s a SmackDown!
Browser Horror Stories
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Techniques Used to PWN Mac Systems
Hacker Halted 2014 - Control Quotient: Adaptive Strategies For Gracefully Losing Control
Hacker Halted 2014 - RDP Fuzzing And Why the Microsoft Open Protocol Specification is Awesome!
Building a Cyber Range - Kevin Cardwell
Incorporating Threat Intelligence into Your Enterprise Communications Systems - Solomon Sonya
Understanding heartbleed by Dustin Noe
Attack and defense in the public cloud by Robert Wood
Defending Applications In the Cloud: Architecting Layered Security Solutions in Cloud Computing Environments By Dr. Stephen D. Gantz