ToorCon XX — FROM CHAOS TO BLISS: HOW WE SOLVED SECURITY IN JUST 20 YEARS - Steve Werby
ToorCon XX — SYMBOLIC COMPUTING, MOVING ON UP. - zv
ToorCon XX — AVOIDING DEFAULT PASSWORDS & SECRETS BREACHES USING OPEN SOURCE - Carpenter & Dittrich
ToorCon XX — ELECTRON HARMONY: DRAWING READABLE SCHEMATICS THE RIGHT WAY - funsized
ToorCon XX — AN INCONVENIENT TRUTH: EVADING THE RANSOMWARE PROTECTION IN WINDOWS 10 - Soya Aoyama
ToorCon XX — YOU’RE NOT ALONE IN YOUR HOTEL ROOM - Michael Wylie
ToorCon XX — UEFI IS SCARY - Gene Erik
ToorCon XX — IF YOU GIVE A CONTAINER A CAPABILITY: A TALE OF CONTAINER EXPLOITATION - Kumar & Glew
ToorCon XX — RIDICULOUS ROUTER: Using OpenWRT to do all the enterprise stuff 2 - Gene Erik
ToorCon XX — BUG BOUNTY HUNTING ON STEROIDS - Anshuman Bhartiya
ToorCon XX — FROM FAR AND NEAR: EXPLOITING OVERFLOWS ON WINDOWS 3.X - Jacob Thompson
ToorCon XX — MY LITTLE AWS IR SANDBOX - Michael Wylie
ToorCon XX — INTRODUCING INFOCONDB.ORG: IMDB FOR HACKER CONS - Tom Samstag (tecknicaltom)
ToorCon XX — IOT BOTNETS : THE CRUX OF "INTERNET OF THINGS" CHAOS! - Aditya K Sood
ToorCon XX — FINDING SECRETS IN SOURCE CODE WITH TRUFFLEHOG - Dylan
ToorCon XX — HIRING SECURITY - Sham
ToorCon XX — KEYNOTE: The Enemy Within - SIMPLE NOMAD
ToorCon XX — SHINING A LIGHT ON A BLACK BOX: REVERSE ENGINEERING PROTOCOLS - Rick Ramgattie
ToorCon XX — SMART CONTRACT HONEYPOTS FOR PROFIT (AND PROBABLY FUN) - Ben Schmidt
ToorCon XX — FOOLING ML IMAGE CLASSIFIERS - Raghav Gurbaxani