Human Hacking with Chris Hadnagy
A bit more of PE with Ange Albertini
PostScript: Danger ahead ! with Andrei Costin
Attacking XML Processing with Nicolas Grégoire
Weapons of Max Destruction V4 with Jorge Sebastiao
SCADA Security: Why is it so hard ? with Amol Sarwate
HTML5: Something wicked this way comes with Krzysztof Kotowicz
Bypassing the Android permission model with Georgia Weidman
Keynote: Where Are We And Where Are We Going with Mikko Hypponen
Questions and Answers : Panel Defensive Nature with Jayson E. Street and Chris Hadnagy
Questions and Answers : Panel offensive Nature with Georgia Weidman and Mario Heiderich
Keynote: Measuring Risk with Time Based Security
“Securing the Internet: YOU’re doing it wrong” (An INFOSEC Intervention) with Jayson E. Street
Got your Nose ! How to steal your precious data without using scripts with Mario Heiderich
Results of a Security Assessment of the Internet Protocol version 6 (IPv6)
What are the new means for cybercriminals to bypass and evade your defenses ? with Klaus Majewski
Corelan Live – Win32 Exploit Development
iOS Applications – Attack and Defensewith Sebastien Andrivet
Malware Reversing Laboratorywith Lee Ling Chuan
Metasploit for Penetration Testingwith Georgia Weidman
Hacking IPv6 networks
Reverse-engineering of Android applications and malwareswith Anthony Desnos