Day 1
- Aaron Weaver – Pipeline Automation: [Slides] [Video]
- Achim Brucker – Using Third Party Components: [Slides] [Video]
- Adam Muntner – Open Source Approaches to Security: [Slides] [Video]
- Ajin Abraham – Automated Mobile Assessment: [Slides] [Video]
- Alvaro Muñoz, Christian Schneider – Surviving the Java serialization apocalypse: [Slides] [Video]
- Andreas Falk – Building Native Cloud Apps: [Slides] [Video]
- Arne Swinnen – Tales of a Bug Bounty Hunter: [Slides] [Video]
- Christian Mainka – Breaking And Fixing: [Slides] [Video]
- Dan Cornell – Source Assisted PenTesting: [Slides] [Video]
- Daniel Kefer – Addressing Security Requirements: [Slides] [Video]
- David Lindner, Jack Mannino – Dont Touch Me That Way: [Slides] [Video]
- David Rook – Leveling an Application Security Program: [Slides] [Video]
- Dinis Cruz – Using Jira To Manage Risks: [Slides] [Video]
- Dirk Wetter – Calm down HTTPS is not a VPN: [Slides] [Video]
- Felix Leder – Bug Hunting on the Dark Side: [Slides] [Video]
- Giancarlo Pellegrino – Compression Bombs: [Slides] [Video]
- Glen ten Cate – OWASP Security Knowledge Framework – Making the web secure by design: [Slides] [Video]
- John Dickson – Making OpenSAMM More Effective: [Slides] [Video]
- Julia Knecht – SAASy SPLC: [Slides] [Video]
- L. Compagna, A. Sudhodanan, A. Armando, R. Carbone – Attack Patterns for Black-Box Det: [Slides] [Video]
- Lotfi ben Othmane – Prediction Models: [Slides] [Video]
- Michele Spagnuolo, Lukas Weichselbaum – Making CSP great again: [Slides] [Video]
- Oliver Lavery – Framework Security – Have You Hugged A Developer Today: [Slides] [Video]
- Scott Davis – Scanning with Swagger: [Slides] [Video]
- Simone Onofri – Security Project Management: [Slides] [Video]
- Timur Khrotko – Lets Skip The Pentest: [Slides] [Video]
- Tobias Gondrom – Ciso Survey: [Slides] [Video]
- Tom Van Goethem – The Timing Attacks They Are A Changin: [Slides] [Video]
Day 2
- Abhay Bhargav – SecDevOps: [Slides] [Video]
- Amit Ashbel – Game of Hacks: [Slides] [Video]
- Amol Sarwate – 2016 State of Vulnerability Exploits: [Slides] [Video]
- Ben Stock – From Facepalm To Brain Bender: [Slides] [Video]
- Chris Romeo – AppSec Awareness: [Slides] [Video]
- Christian Wressengger – Flash-based Malware: [Slides] [Video]
- Christopher Spaeth – From DTD to XXE: [Slides] [Video]
- Grant McCracken – Running a Bug Bounty: [Slides] [Video]
- Ikka Turunen – Chain of Trust: [Slides] [Video]
- J. Rose, R. Sulatycki – Grow up AppSec-A case study of maturity models and metrics: [Slides] [Video]
- Jacky Fox – Women in Cyber: [Slides] [Video]
- Jakub Kaluzny – Big problems with big data – Hadoop interfaces security: [Slides] [Video]
- Johannes Dahse – Static Code Analysis of Complex PHP Application Vulnerabilities: [Slides] [Video]
- John Kozyrakis – Certificate Pinning: [Slides] [Video]
- Jonathan Kuskos – The Top 10 Web Hacks of 2015: [Slides] [Video]
- Juraj Somorovsky – Practical Attacks on Real World Crypto Implementations : [Slides] [Video]
- Liesbeth Kimpen – Think Villain Proof: [Slides] [Video]
- Marisa Fagan – The Cool Factor: [Slides] [Video]
- Matthias Rohr – Practical Threat Modelling: [Slides] [Video]
- Mike West – Keynote – Hardening the Web Platform: [Slides] [Video]
- Rob Van Der Veer – GriponSSD: [Slides] [Video]
- Sebastian Lekies – Securing AngularJS Applications: [Slides] [Video]
- Wojtek Dworakowski – Internet Banking Safeguards Vulnerabilities: [Slides] [Video]
- TonyUV – Attack Tree Vignette for CaaS: [Slides] [Video]
- Vaibhav Gupta – Lightning training – Security Automation using ZAP: [Slides] [Video]
- Yair Amit – The Ultimate Reason Why Hackers Are Winning The Mobile Malware Battle: [Slides] [Video]