Here is the confirmed list of Speakers who will be at theSummit this year! Thank you all for coming and being available to all guest who attend!
NOTE: This is the first run of confirmed guest, more to follow soon!
Zoz Exploitable Assumptions Workshop ; Pwned By The Owner: What Happens When You Steal A Hacker's Computer
Garret Picchioni The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks
Unlocked Exploitable Assumptions Workshop
Tyler Krpata Like a Boss: Attacking JBoss
Tony Flick Getting Social with the Smart Grid
Decius Exploiting Internet Surveillance Systems
Scott Wolchok Crawling BitTorrent DHTs for Fun and Profit
Sid Hacking Oracle From Web Apps
Blake Self SMART Project: Applying Reliability Metrics to Security Vulnerabilities; Hacking Docsis for Fun and Profit
Shawn Merdinger We Don't Need No Stinkin' Badges: Hacking Electronic Door Access Controllers
Ed Schaller Exploiting WebSphere Application Server's JSP Engine
Samy Kamkar How I Met Your Girlfriend
Matt Ryanczak Implementing IPv6 at ARIN
Richard Thieme Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are
Rich Smith pyREtic - In-memory Reverse Engineering for Obfuscated Python Bytecode
Righter Kunkel Air Traffic Control Insecurity 2.0
Patrick Thomas Web Application Fingerprinting with Static Files
Patrick Mullen Open Source Framework for Advanced Intrusion Detection Solutions
Oren Isacson Exploiting Digital Cameras.
Nicholas Percoco This is not the droid you're looking for...; Malware Freak Show 2: The Client-Side Boogaloo
Moxie Marlinspike Changing Threats To Privacy: From TIA To Googl
Mike Metzger Letting the Air Out of Tire Pressure Monitoring Systems
Marco Bonetti Mobile Privacy: Tor on the iPhone and Other Unusual Devices
metr0 Securing MMOs: A Security Professional's View From the Inside
Justin Morehouse Getting Social with the Smart Grid
Joshua Marpet Facial Recognition: Facts, Fiction, and Fsck-ups
Josh Pyorre Build Your Own Security Operations Center for Little or No Money.
John McNabb Cyberterrorism and the Security of the National Drinking Water Infrastructure
Kingpin Making the DEFCON 18 Badge
James Shewmaker Browser Based Defenses
Jibran Llyas Malware Freak Show 2: The Client-Side Boogaloo
Jennifer Granick Law of Laptop search & Seizure; Meet the EFF; Legal Developments in Hardware Hacking
Jeff Bryner Google Toolbar: The NARC Within; Cloud Computing, a weapon of mass destruction?; The keys to running a successful DEF CON Group by DC612
Jayson E. Street Stratagem 1 - Deceiving the Heavens to Cross the Sea
Zuk Exploitation on ARM - Technique and Bypassing Defense Mechanism
Adrian Crenshaw Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device
Iftach Ian Amit Cyber[Crime|War] Charting Dangerous Waters
HONEY Ripping Media Off Of the Wire
Craig Heffner How to Hack Millions of Routers
Gmark Tales from the Crypto
Bruce Potter This Needs To Be Fixed" and Other Jokes In Commit Statements
Garry Pejski My Life As A Spyware Developer
Fyodor Mastering the Nmap Scripting Engine
Ferdinand Schober Gaming in the Glass Safe - Games, DRM & Privacy
theNURSE Weaponizing Lady GaGa, Psychosonic Attacks
Deviant Ollan The Search for Perfect Handcuffs... and the Perfect Handcuff Key
Dennis Brown Resilient Botnet Command and Control with Tor
Jack Daniel PCI, Comp.Controls & Comp. Security
DC Flux DCFluX in: Moon-bouncer
David Fifield Mastering the Nmap Scripting Engine
David King Hardware Hacking for Software Guys
David Shackleford PCI, Comp.Controls & Comp. Security; Internet Wars
Caleb Sima Drivesploit: Circumventing Both Automated AND Manual Drive-by-Download Detection
Daniel Burroughs Open Public Sensors and Trend Monitoring
Big Poppa ReverShell Sniper Forensics - One Shot, One Kill
Christian Papathanasiou This is not the droid you're looking for..."
Charlie Miller Kim Jong-il and Me: How to Build a Cyber Army to Defeat the U.S.
Chris Paget Practical Cellphone Spying; Extreme-range RFID Tracking
Cesar Cerrudo Token Kidnapping's Revenge
BarrettWeisshaar The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks
Rain Build a lie detector/beat a lie detector
Nguyen Anh Quynh Operating System Fingerprinting for Virtual Machines
Adam Pridgen Toolsmithing an IDA Bridge, Case Study For Building a Reverse Engineering Tool
Jon McCoy Attacking .Net Programs at Runtime
Chad Houck Decoding reCAPTCHA
NOTE: This is the first run of confirmed guest, more to follow soon!
Zoz Exploitable Assumptions Workshop ; Pwned By The Owner: What Happens When You Steal A Hacker's Computer
Garret Picchioni The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks
Unlocked Exploitable Assumptions Workshop
Tyler Krpata Like a Boss: Attacking JBoss
Tony Flick Getting Social with the Smart Grid
Decius Exploiting Internet Surveillance Systems
Scott Wolchok Crawling BitTorrent DHTs for Fun and Profit
Sid Hacking Oracle From Web Apps
Blake Self SMART Project: Applying Reliability Metrics to Security Vulnerabilities; Hacking Docsis for Fun and Profit
Shawn Merdinger We Don't Need No Stinkin' Badges: Hacking Electronic Door Access Controllers
Ed Schaller Exploiting WebSphere Application Server's JSP Engine
Samy Kamkar How I Met Your Girlfriend
Matt Ryanczak Implementing IPv6 at ARIN
Richard Thieme Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are
Rich Smith pyREtic - In-memory Reverse Engineering for Obfuscated Python Bytecode
Righter Kunkel Air Traffic Control Insecurity 2.0
Patrick Thomas Web Application Fingerprinting with Static Files
Patrick Mullen Open Source Framework for Advanced Intrusion Detection Solutions
Oren Isacson Exploiting Digital Cameras.
Nicholas Percoco This is not the droid you're looking for...; Malware Freak Show 2: The Client-Side Boogaloo
Moxie Marlinspike Changing Threats To Privacy: From TIA To Googl
Mike Metzger Letting the Air Out of Tire Pressure Monitoring Systems
Marco Bonetti Mobile Privacy: Tor on the iPhone and Other Unusual Devices
metr0 Securing MMOs: A Security Professional's View From the Inside
Justin Morehouse Getting Social with the Smart Grid
Joshua Marpet Facial Recognition: Facts, Fiction, and Fsck-ups
Josh Pyorre Build Your Own Security Operations Center for Little or No Money.
John McNabb Cyberterrorism and the Security of the National Drinking Water Infrastructure
Kingpin Making the DEFCON 18 Badge
James Shewmaker Browser Based Defenses
Jibran Llyas Malware Freak Show 2: The Client-Side Boogaloo
Jennifer Granick Law of Laptop search & Seizure; Meet the EFF; Legal Developments in Hardware Hacking
Jeff Bryner Google Toolbar: The NARC Within; Cloud Computing, a weapon of mass destruction?; The keys to running a successful DEF CON Group by DC612
Jayson E. Street Stratagem 1 - Deceiving the Heavens to Cross the Sea
Zuk Exploitation on ARM - Technique and Bypassing Defense Mechanism
Adrian Crenshaw Programmable HID USB Keystroke Dongle: Using the Teensy as a pen testing device
Iftach Ian Amit Cyber[Crime|War] Charting Dangerous Waters
HONEY Ripping Media Off Of the Wire
Craig Heffner How to Hack Millions of Routers
Gmark Tales from the Crypto
Bruce Potter This Needs To Be Fixed" and Other Jokes In Commit Statements
Garry Pejski My Life As A Spyware Developer
Fyodor Mastering the Nmap Scripting Engine
Ferdinand Schober Gaming in the Glass Safe - Games, DRM & Privacy
theNURSE Weaponizing Lady GaGa, Psychosonic Attacks
Deviant Ollan The Search for Perfect Handcuffs... and the Perfect Handcuff Key
Dennis Brown Resilient Botnet Command and Control with Tor
Jack Daniel PCI, Comp.Controls & Comp. Security
DC Flux DCFluX in: Moon-bouncer
David Fifield Mastering the Nmap Scripting Engine
David King Hardware Hacking for Software Guys
David Shackleford PCI, Comp.Controls & Comp. Security; Internet Wars
Caleb Sima Drivesploit: Circumventing Both Automated AND Manual Drive-by-Download Detection
Daniel Burroughs Open Public Sensors and Trend Monitoring
Big Poppa ReverShell Sniper Forensics - One Shot, One Kill
Christian Papathanasiou This is not the droid you're looking for..."
Charlie Miller Kim Jong-il and Me: How to Build a Cyber Army to Defeat the U.S.
Chris Paget Practical Cellphone Spying; Extreme-range RFID Tracking
Cesar Cerrudo Token Kidnapping's Revenge
BarrettWeisshaar The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks
Rain Build a lie detector/beat a lie detector
Nguyen Anh Quynh Operating System Fingerprinting for Virtual Machines
Adam Pridgen Toolsmithing an IDA Bridge, Case Study For Building a Reverse Engineering Tool
Jon McCoy Attacking .Net Programs at Runtime
Chad Houck Decoding reCAPTCHA
Comment