- 7 Deadly Sins: Unlock the Gates of Mobile Hacking Heaven - Dan Kuykendall
- adventures in reviewing mountains of code - jon boyd
- Anatomy of a WebShell - D0n Quix0te
- Android iPhone Risks and Solutions - Jonathan Carter
- An inconvenient Zeus: The rise of Saas targeted malware - Ami Luttwak
- Application Security at DevOps Speed and portfolio scale - Jeff Williams
- attack-driven defense - zane lackey
- Can AppSec Training Really make a smart developer - john dickson
- CSRF: not all defenses are created equal - Ari Elias-Bachrach
- David Schwartzberg - DIY Command & Control For Fun And *No* Profit
- detecting and defending against state actor surveillance: robert r
- how to spy with python so easy the NSA can do it - Lynn Root
- HTML5 JS Security - maty siman
- HTTP Time Bandit: Tigran Gevergyan Vaagn Toukharian
- libinjection: from sqli to xss - Nick Galbreath
- Mantra OS: Because the World is Cruel - Gregory Disney-Leugers
- Michael Coates - Keynote
- Million Browser Botnet - Jeremiah Grossman Matt Johanssen
- new framewords old problems - ken johnson mike mccabe
- Next Generation Red Teaming - Robert Wood
- OWASP Top 10 Mobile Risks: 2014 Reboot - Jack Mannino & Jason Haddix
- Privacy vs Security Intricacies - Robert Hansen (keynote)
- Running at 99% Surviging an Application DoS: Ryan Huber
- sandboxes: no thy limit - rahul kashyap
- The Cavalry is Us - Beau Woods
- The CSOs myopia - jordan bonagura
- Top Ten Proactive Web Application Controls - Jim Manico
- What is CSP and Why Haven't You Applied it Yet - CSPSuperFriends
- Whiz, Bang, ZAP! An introduction to OWASP's Zed Attack Proxy - Ben Walther
- Why Infosec Needs Rugged DevOps Now: A Study Of High Performing IT Organizations - Gene Kim