State of Cyber Security - Dave DeWalt, Chairman & CEO - FireEye, Inc.
Researching Android Device Security with the Help of a Droid Army
20 Ways Past Secure Boot - Jasper Van Woudenberg, Riscure
Jason Shirk "Privacy for Security Geeks - Dancing with Lawyers"
Autonomous Remote Hacking Drones - Dr. Phil Polstra
111 Years of Vulnerabilities - Brian Martin
Methods of Malware Persistence on OSX - Patrick Wardle, SynAck
Just What the Doctor Ordered Part II - Scott Erven,
Windows Kernel Fuzzing for Intermediate Learners - Ben Nagy, COSEINC
Trapping Hacks with Ensnare - Scott Behrens & Andy Hoernecke, Netflix
Netizen Death Star - L0rd V
So You Want to be the CSO by Daniel Blander
Suns Out Guns Out: Hacking without a Vehicle by Charlie Miller & Chris Valasek
Exploiting Elevator Security Weaknesses by Deviant Ollam
Medical Devices Passwords to Pwnage by Scott Erven
Social Engineering the Windows Kernel by James Forshaw
Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean Metcalf
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
There's Waldo by Patrick Wardle & Colby Moore
Project Zero- Making 0day hard(er) by Chris Evans