| You Can't Build a Team in the Thunderdome: Better Hiring through Empathy | LISA16 | Ryan McKern |
| Engineer the Future | LISA16 | Jinnah Hosein |
| Don't Burn Out or Fade Away: Conquering Occupational Burnout | LISA16 | Avleen Vig |
| Behind Closed Doors: Managing Passwords in a Dangerous World | LISA16 | Noah Kantrowitz |
| An Architect's Guide to Designing Risk | LISA16 | Daemon Behr |
| The Hard Truths about Microservices and Software Delivery | LISA16 | Anders Wallgren, Avantika Mathur |
| How to Succeed in Ops without Really Trying | LISA16 | Chastity Blackwell |
| SRE at a StartUp: Lessons from LinkedIn | LISA16 | Craig Sebenik |
| Traps and Cookies: A Mystery Package from Your Former Self | LISA16 | Tanya Reilly |
| Capturing All of Stack Overflow's Logs | LISA16 | George Beech |
| How Should We Ops? | LISA16 | Courtney Eckhardt |
| Strategic Storytelling | LISA16 | Jessica Hilt |
| Stop Lying to Your Customers—the Cloud Is Neither Private Nor Secure: What Your Customers Need to Do for Privacy and Security, and How You Can Help Them | LISA16 | James "Brad" Whitehead |
| Sensu and the Art of Monitoring | LISA16 | Sean Porter |
| UAVs, IoT, and Cybersecurity | LISA16 | David Kovar |
| Building a Billion User Load Balancer | LISA16 | Patrick Shuff |
| Modern Cryptography Concepts: Hype or Hope | LISA16 | Radia Perlman |
| The Evolution of People, Process, and Technology in the Digital Age | LISA16 | John Roese |
| Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification | USENIX Security '16 | Ben Stock, Giancarlo Pellegrino, Christian Rossow, Martin Johns, Michael Backes |
| Identifying and Characterizing Sybils in the Tor Network | USENIX Security '16 | Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster |
| You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors | USENIX Security '16 | Neil Zhenqiang Gong, Bin Liu |
| What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of JIT-ROP Defenses | USENIX Security '16 | Giorgi Maisuradze, Michael Backes, Christian Rossow |
| PIkit: A New Kernel-Independent Processor-Interconnect Rootkit | USENIX Security '16 | Wonjun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, John Kim |
| Stealing Machine Learning Models via Prediction APIs | USENIX Security '16 | Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart |
| Protecting Privacy of BLE Device Users | USENIX Security '16 | Kassem Fawaz, Kyu-Han Kim, Kang G. Shin |