Jeremy Brown & David Seidman - Microsoft Vulnerability Research: How to be a finder as a vendor [Rooted CON 2014]
Master Serial Killer - DEF CON 22 - ICS Village
Nazira Omuralieva - Susan Kaufman - Improving Application Security - Vulnerability Response in the ISV World
Heartbleed && Wireless
Software security (vulnerabilities) and physical security
SCADA StrangeLove 2: We already know
BlackHat 2011 - Exploiting Siemens Simatic S7 PLCs (white paper)
Modems, ISPs & the media How the Comhem vulnerability could have been handled, and what happened instead.
Checkpoint hack
Protect Your Drupal Site Against Common Security Attacks
Triangle.rb - How Secure is Your Rails Site, Anyway?
Bug Bounty for - Beginners