- DEF CON 15 - Dave Josephsen - Homeless Vikings
- DEF CON 15 - David Byrne - Intranet Invasion with Anti DNS Pinning
- DEF CON 15 - David Hulton - Faster Pwning Assured
- DEF CON 15 - David Smith - Cool Stuff Learned Competing in DC3 Digital Challenge
- DEF CON 15 - Dead Addict - Picking Up the Zero Day
- DEF CON 15 - DeMott Enbody and Punch - Revolutionizing Grey box Attack Surface
- DEF CON 15 - Dirro and Kollberg - Trojans a Reality Check
- DEF CON 15 - DJ Capelis - Virtualization Enough Holes to Work Vegas
- DEF CON 15 - Doug Mohney - Next Wireless Frontier TV White Spaces
- DEF CON 15 - Dror Shalev - A Crazy Toaster
- DEF CON 15 - Edward Lee - Comparing App Sec Tools
- DEF CON 15 - Eriksson and Panel - Kernel Wars
- DEF CON 15 - Evans and Grothoff - Routing in the Dark
- DEF CON 15 - Gadi Evron - Estonia and Information Warfare
- DEF CON 15 - Gadi Evron - Webserver Botnets
- DEF CON 15 - Ganesh Devarajan - Unraveling SCADA Protocols Using Sulley Fuzzer
- DEF CON 15 - Geers - Greetz from room 101
- DEF CON 15 - geoffrey - The Completion Backward Principle
- DEF CON 15 - Granick - Disclosure and Intellectual Property Law 2006 - 2007
- DEF CON 15 - Greg Conti - Satellite Imagery Analysis
- DEF CON 15 - Greg Hoglund - Virtual World Real Hacking
- DEF CON 15 - Ian Harris - Interstate A Stateful Protocol Fuzzer for SIP
- DEF CON 15 - I)ruidm: Real-time Steganography with RTP
- DEF CON 15 - Jacob West - How I Learned to Stop Fuzzing
- DEF CON 15 - Janne Lindquist - IPv6 is Bad for Privacy
- DEF CON 15 - Jason Scott - The Edge of Forever Making Computer History
- DEF CON 15 - Jesse DAguanno - LAN Protocol Attacks PT1
- DEF CON 15 - Joe Grand - Making the DEF CON Badge
- DEF CON 15 - John Heasman - Hacking the Extensible Firmware Interface
- DEF CON 15 - John "jur1st" Benson: Bridging the Gap Between Technology and the Law
- DEF CON 15 - King Tuna - Hacking EVDO
- DEF CON 15 - KN Gopinath - Multipot: A More Potent Variant of Evil Twin
- DEF CON 15 - Luiz Eduardo - The Hacker Society Around the Corp World
- DEF CON 15 - Lukas Grunwald - Security by Politics
- DEF CON 15 - Luke Jennings - One Token to Rule Them All
- DEF CON 15 - Major Malfunction - Aliens Cloned my Sheep
- DEF CON 15 - Martyn Ruks - MQ Jumping
- DEF CON 15 - Mathewson - Social Attacks On Anonymity Networks
- DEF CON 15 - Mathewson - Technical Changes Since You Last Heard About TOR
- DEF CON 15 - Matt Richard - Beyond Vuln Scanning
- DEF CON 15 - Meer and Slaviero - Its All About the Timing
- DEF CON 15 - Michael Shearer - The Church of Wi Fi Presents Hacking Iraq
- DEF CON 15 - Michael Shrenk - The EXE Image Exploit
- DEF CON 15 - Mike Perry - Securing the TOR Network
- DEF CON 15 - Moore and Valsmith - Tactical Exploitation
- DEF CON 15 - Murray and Chuvakin - The Science of Social Engineering NLP
- DEF CON 15 - Murray and Kushner - Creating and Managing your Security Career
- DEF CON 15 - Ne0nRa1n and Joe Grand - Hack Your Brain With Video Games
- DEF CON 15 - nonsequitor and Ab3nd - Hardware Hacking For Software Geeks
- DEF CON 15 - Ofir Arkin - kNAC
- DEF CON 15 - Oskar Sandberg - Network Mathematics: Why is it a Small World?
- DEF CON 15 - Palmer and Stamos - Breaking Forensics Software
- DEF CON 15 - Panel - Anti Spyware Coalition
- DEF CON 15 - Panel - Ask the EFF
- DEF CON 15 - Panel - Boomstick Fu
- DEF CON 15 - Panel - Disclosure Panel
- DEF CON 15 - Panel - Internet Wars 2007
- DEF CON 15 - Panel - Meet the Feds
- DEF CON 15 - Panel - Meet the VCs
- DEF CON 15 - Panel - Self Publishing in the Underground
- DEF CON 15 - Patrik Karlsson - SQL Injection
- DEF CON 15 - Paul Ziegler - Multiplatform Malware Within the NET Framework
- DEF CON 15 - Peck and Feinstein - CaffeineMonkey
- DEF CON 15 - Peter Berghammer - A Journalists Prospective on Sec Research
- DEF CON 15 - Peter Gutmann - Commercial Malware Industry
- DEF CON 15 - Phillip Zimmerman - Z Phone
- DEF CON 15 - Pilgrim - How to Be a Wi Fi Ninja
- DEF CON 15 - Plet - Stealing Identity Management Systems
- DEF CON 15 - Quist and Valsmith - Covert Debugging
- DEF CON 15 - Richard Theime - Hacking UFOlogy
- DEF CON 15 - Rich Murphey - Windows Vista Log Forensics
- DEF CON 15 - Rick Deacon - Hacking Social Lives Myspace
- DEF CON 15 - Ricky Hill - GeoLocation of Wi fi Access Points
- DEF CON 15 - Rios and McFeters - Biting the Hand That Feeds You
- DEF CON 15 - Robert Clark - Computer and Internet Security Law
- DEF CON 15 - Robert Stoudt - When Tapes Go Missing
- DEF CON 15 - Roger Dingledine - Tor and Blocking Resistance
- DEF CON 15 - Sam Bowne - Teaching Hacking at College
- DEF CON 15 - Schuyler Towne - Locksport An Emerging Subculture
- DEF CON 15 - Scott Moulton - Re Animating Drives Advanced Data Recover
- DEF CON 15 - Sean Bodmer - Analyzing Intrusions and Intruders
- DEF CON 15 - Sergey Bratus - Entropy Based Data Organization Tricks
- DEF CON 15 - Shawn Moyer - Unsmashing the Stack Overflows and Counter measures
- DEF CON 15 - Squidly1 - Thinking Outside the Console Box
- DEF CON 15 - Steve Dunker - Everything about Police Procedure in 50 mins
- DEF CON 15 - Steve Orrin - The SOA XML Threat Model
- DEF CON 15 - Steve Topletz - Portable Privacy
- DEF CON 15 - Stracener and Luck - Hacking the EULA
- DEF CON 15 - Subere - Fingerprinting and Cracking Java Obfuscated Code
- DEF CON 15 - Sysmin and Marklar - Creating Unreliable Systems
- DEF CON 15 - The Dark Tangent - CiscoGate
- DEF CON 15 - Thomas Holt - The Market for Malware
- DEF CON 15 - Thomas Wilhelm - Turn Key Pen Test Labs
- DEF CON 15 - Tobias and Fiddler - High Insecurity Locks Lies and Liablity
- DEF CON 15 - Tony Sager - Vulns and the Information Assurance Directorate
- DEF CON 15 - Valsmith and Delchi - Malware Secrets
- DEF CON 15 - Vitaly Kamlyuk Fighting Malware on Your Own
- DEF CON 15 - Vivek Ramachandran - The Emperor Has No Cloak
- DEF CON 15 - Zac Franken - Hacking your Access Control Reader
- DEF CON 15 - Zed Shaw - Saving the Internet with Hate