55:00 MAIN Hunting for Privilege Escalation in Windows Environment Teymur Heirhabarov All Hacking Cons
44:55 MAIN Violation of the most valuable attacks on license managers Vladimir Daschenko, Sergey Temniko All Hacking Cons
20:30 MAIN Is biometrics technology mature enough for mass use Nikita Vdovushkin Vladislav Lazarev All Hacking Cons
47:33 MAIN HIDS as a service deployment and control over 20 000 installations Ivan Agarkov All Hacking Cons
39:48 MAIN Intel ME Manufacturing Mode a phantom menace Maxim Goryachy, Mark Ermolov All Hacking Cons
13:45 MAIN Getting your hands dirty A practical approach towards learning secure coding through interactiv All Hacking Cons
33:06 MAIN Wake up, Neo detection of virtualization via speculative execution Innokenty Sennovsky All Hacking Cons
1:48:41 FINANCE For the sake of money Payment endpoint's vulnerabilities Timur Yunusov, Yaroslav Babin All Hacking Cons