| Several Horror Stories about the Encrypted Web | Enigma 2016 | Peter Eckersley, Yan Zhu |
| The Global Conversation on Encryption | Enigma 2016 | Amie Stepanovich |
| Social Media Self-Defense: A Guide to Stopping Stalkers | Enigma 2016 | Elle Armageddon |
| Panopticlick: Fingerprinting Your Web Presence | Enigma 2016 | Bill Budington |
| Protecting High Risk Users | Enigma 2016 | Eva Galperin, Morgan Marquis-Boire |
| Trust Beyond the First Hop—What Really Happens to Data Sent to HTTPS Websites | Enigma 2016 | Nick Sullivan |
| Defending, Detecting, and Responding to Hardware and Firmware Attacks | Enigma 2016 | Teddy Reed |
| Usable Security—The Source Awakens | Enigma 2016 | Matthew Smith |
| Security and Usability from the Frontlines of Enterprise IT | Enigma 2016 | Jon Oberheide |
| Why Is Usable Security Hard, and What Should We Do about It? | Enigma 2016 | Adrienne Porter Felt |
| Lessons Learned While Protecting Gmail | Enigma 2016 | Elie Bursztein |
| From Concept to Deployment—The Life (and Death) of Security Features | Enigma 2016 | Glenn Wurster |
| Server-side Second Factors: A Statistical Approach to Measuring User Authenticity | Enigma 2016 | David Freeman |
| Building a DDoS Mitigation Pipeline | Enigma 2016 | Marek Majkowski |
| PKI at Scale Using Short-lived Certificates | Enigma 2016 | Bryan Payne |
| Computer Security and the Internet of Things | Enigma 2016 | Tadayoshi Kohno |
| Modern Automotive Vulnerabilities: Causes, Disclosures, and Outcomes | Enigma 2016 | Stefan Savage |
| Data Integrity Based Attacks in Investigative Domains: How Companies Are Exploiting Data Science to Thwart Investigative Outcomes | Enigma 2016 | Eric W. D. Rozier |
| Dolla Dolla Bill Y'all: Cybercrime Cashouts | Enigma 2016 | Benjamin Brown |
| Drops for Stuff: An Analysis of Reshipping Mule Scams | Enigma 2016 | Giovanni Vigna |
| Bullet-Proof Credit Card Processing | Enigma 2016 | Damon McCoy |
| Hacking Health: Security in Healthcare IT Systems | Enigma 2016 | Avi Rubin |
| Medical Device Security | Enigma 2016 | Kevin Fu |
| It Was Never Going to Work, So Let’s Have Some Tea (Presentation) | LISA15 | James Mickens |
| Managing and Tracking Database Deployments | LISA15 | CJ Estel |