6:37 Lessons learned from running big bug bounty programs Katie Moussouris Luta Security All Hacking Cons
4:50 fileceptualizing attribution and why it matters Benjamin Buchanan Harvard University All Hacking Cons
5:23 Inserting privacy controls and due process into semi autonomous algorithms Matthew Carroll All Hacking Cons
3:00 The world will see and just saw an Internet zombie apocalypse Phil Stanhope Dyn All Hacking Cons