- 100 Bug Bounties and Security Research Kevin Johnson
- 101 Securing The Cloud Alan Zukowski
- 102 Hacking Chris Berberich
- 103 Vendor Induced Security Issues Dave Chronister
- 104 Pentest Apocalypse Beau Bullock
- 105 Kippo and Bits and Bits Chris Teodorski
- 106 The Art of Post infection Response Mitigation Caleb Crable
- 107 The Need for Pro active Defense and Threat Hunting Within Organizations Andrew Case
- 200 Finding Common Ground Within the Industry and Beyond David Shearer
- 201 Ways to Identify Malware on a System Ryan Irving
- 202 Android Malware and Analysis Shane Hartman
- 203 Teaching Kids and Even Some Adults Security Through Gaming Le Grecs
- 204 Evaluating Commercial Cyber Threat Intelligence John Berger
- 300 Cyber Geography and the Manifest Destiny of the 21st Century Joe Blankenship
- 301 Mitigating Brand Damage From A Cyber Attack Guy Hagen
- 302 What is a security analyst and what job role will they perform James Risler
- 303 Live Forensic Acquisition Techniques Joe Partlow
- 304 Cyber Security Awareness for Healthcare Professionals Marco Polizzi