Builders and Breakers: Partnering for Secure Elections
Bugs on a Plane: Implementing a Bug Bounty in an Airline IT/OT Environment
DEF CON 31 Policy - All Your Vulns Are Belong to Terms and Conditions
KEYNOTE: Release the Hounds, Part 2
[TRANSCRIPT] Threats that may have gone unnoticed by organizations during the pandemic