| Security Technology Adoption; Building Hardware Is Just the Start | Enigma 2018 | Paul Waller |
| Cyber Strategy: The Evolving Nature of Cyber Power and Coercion | Enigma 2018 | Brandon Valeriano |
| What Would You Do With a Nation-State Cyber Army? | Enigma 2018 | Greg Conti |
| Being Creative, Securely | Enigma 2018 | Melody Hildebrandt |
| LISA: A Practical Zero Trust Architecture | Enigma 2018 | Bryan Zimmer |
| Compliance != Security (Except When It Might Be) | Enigma 2018 | Robert Clark |
| Insecurity in Information Technology | Enigma 2018 | Tanya Janca |
| The Web Tracking Arms Race: Past, Present, and Future | Enigma 2018 | Arvind Narayanan |
| Modern Mind Control: Public Opinion Manipulation in Our Online World | Enigma 2018 | Robert McArdle |
| Going Nuclear: Programmatic Protections against Extreme Vetting, Social Pressures, and Coercion | Enigma 2018 | Cara Marie, Andy Grant |
| Gig Work and the Digital Security Divide | Enigma 2018 | Kendra Albert |
| Privacy @ Instagram | Enigma 2018 | Carrie Jiang |
| Differential Privacy at Scale: Uber and Berkeley Collaboration | Enigma 2018 | Joe Near |
| Surfing the Motivation Wave to Create Security Behavior Change | Enigma 2018 | Masha Sedova |
| We Gave You This Internet, Now Play by Our Rules | Enigma 2018 | Gennie Gebhart, Bill Marczak |
| Social Cybersecurity: Reshaping Security through an Empirical Understanding of Human Social Behavior | Enigma 2018 | Sauvik Das |
| System Crash, Plane Crash: Lessons from Commercial Aviation and Other Engineering Fields | LISA17 | Jon Kuroda |
| Wait for Us! Evolving On-Call as Your Company Grows | LISA17 | Christopher Hoey |
| Debugging at Scale Using Elastic and Machine Learning | LISA17 | Mohit Suley |
| Where's the Kaboom? There Was Supposed to Be an Earth-Shattering Kaboom! | LISA17 | David Blank-Edelman |
| Calcifying Crisis Readiness | LISA17 | Rock Stevens |
| Sample Your Traffic but Keep the Good Stuff! | LISA17 | Ben Hartshorne |
| Managing SSH Access without Managing SSH Keys | LISA17 | Niall Sheridan |
| Failure Happens: Improving Incident Response in Large-Scale Organizations | LISA17 | Damon Edwards |
| "Don't You Know Who I Am?!" The Danger of Celebrity in Tech | LISA17 | Corey Quinn |