Predrag Zivic - Mike Lecky - Structured Incident Types To Streamline Incident Response
Advanced Data Exfiltration The Way Q Would Have Done It
Million Browser Botnet
Ryan Jones - Security Convergence – Gold Mines and Pitfalls
Banking Fraud Evolution
Vicente Diaz - Jorge Mieres - Fuel For Pwnage
Dan Guido SOURCE Boston 2011
Dan Cornell - The Real Cost of Software Remediation
Extracting Forensic Information From Zeus Derivatives
iBanking - a botnet on Android
PTES: PenTest Execution Standard
Ben Agre - Adding Another Level of Hell to Reverse Engineering
Wendy Nather - Building a Rube Goldberg Application Security Program
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World
Chris Gates - Attacking Oracle Web Applications With Metasploit (and wXf)
Men in the Server Meet the Man in the Browser
Threat Modeling: Best Practices
David Snead - Nailing Down Security Regulations
Keynote
Everything you should already know about MS-SQL post-exploitation