| Beyond Burnout: Mental Health and Neurodiversity in Engineering | SREcon18 Americas | James Meickle |
| What It Really Means to Be an Effective Engineer | SREcon18 Americas | Edmond Lau |
| Security and SRE: Natural Force Multipliers | SREcon18 Americas | Cory Scott |
| If You Don’t Know Where You’re Going, It Doesn’t Matter How Fast You Get There | SREcon18 Americas | Nicole Forsgren, Jez Humble |
| Rage against the Ghost in the Machine | Enigma 2018 | Lilly Ryan |
| Stranger Things: Who’s Listening When the Device Is Always On? | Enigma 2018 | Emily McReynolds |
| Bits & Bytes, Flesh & Blood, and Saving Real Lives via Clinical Simulations | Enigma 2018 | Joshua Corman |
| Developing a Science of Internet Censorship Resistance: Opportunities and Challenges for Network Measurement | Enigma 2018 | Phillipa Gill |
| The Impact of Third-party Code on Android App Security | Enigma 2018 | Erik Derr |
| Protecting Firefox Data with Content Signatures | Enigma 2018 | Julien Vehent |
| The Evolving Architecture of the Web and Its Impact on Security, Privacy, and Latency | Enigma 2018 | Nick Sullivan |
| Crypto Crumple Zones: Protecting Encryption in a Time of Political Uncertainty | Enigma 2018 | Charles Wright |
| Cryptographically Secure Data Analysis for Social Good | Enigma 2018 | Mayank Varia |
| Emerging Cryptography | Enigma 2018 | Steve Weis |
| Hacking the Law: Are Bug Bounties a True Safe Harbor? | Enigma 2018 | Amit Elazari |
| IoE, Connecting Regulation to Risk | Enigma 2018 | Travis LeBlanc |
| The Great Cryptographic Divide | Enigma 2018 | Jason Truppi |
| Protecting Financial Stability against Cyber Threats: Proposal for an International Agreement | Enigma 2018 | Tim Maurer |
| Some Thoughts on Deep Learning and Infosec | Enigma 2018 | Jeremy Howard |
| Hats off to DevSecOps | Enigma 2018 | Shannon Lietz |
| Combining the Power of Builders and Breakers | Enigma 2018 | Casey Ellis |
| When Malware is Packin’ Heat | Enigma 2018 | Giovanni Vigna, Davide Balzarotti |
| The Future of Cyber-Autonomy | Enigma 2018 | David Brumley |
| Least Privilege: Security Gain without Developer Pain | Enigma 2018 | Travis McPeak |
| Anatomy of Account Takeover | Enigma 2018 | Grzergor Milka |