| "I Thought I Was Being Strong with a Complicated Person": The Tales of Intimate Gender-Based Online Abuse in the Global South | Enigma 2021 | Sofía Celi |
| Breaking Trust – Shades of Crisis Across an Insecure Software Supply Chain | Enigma 2021 | Trey Herr |
| The Practical Divide between Adversarial ML Research and Security Practice: A Red Team Perspective | Enigma 2021 | Hyrum Anderson |
| The State of 0-Day in-the-Wild Exploitation | Enigma 2021 | Maddie Stone |
| Contact Tracing | Enigma 2021 | Ben Adida, Mike Judd, Ali Lange, Tiffany C. Li, Marcel Salathé |
| Privacy and Security Nutrition Labels to Inform IoT Consumers | Enigma 2021 | Pardis Emami-Naeini |
| Privacy, Measurably, Isn't Dead | Enigma 2021 | Patrick Kelley |
| Implementing Differential Privacy for the 2020 Census | Enigma 2021 | Simson Garfinkel |
| Gone, But Not "Forgotten"—Technical & Practical Challenges In Operationalizing Modern Privacy Rights | Enigma 2021 | Kelly Huang |
| No Data, No Problem—Giving Nuclear Inspectors Better Tools without Revealing State Secrets | Enigma 2021 | Mitch Negus |
| A Quest for the Physics of Cyberspace | Enigma 2021 | Julian Rrushi |
| A Sound Mind in a Vulnerable Body: Practical Hardware Attacks on Deep Learning | Enigma 2021 | Sanghyun Hong |
| Hardware: A Double-Edged Sword for Security | Enigma 2021 | Nicole Fern |
| The Full Stack Problem of Election Security | Enigma 2021 | Jack Cable |
| The Adventurous Tale of Online Voting in Switzerland | Enigma 2021 | Dr. Christian Folini |
| Security & U.S. Political Campaigns: A Study & Expert Roundtable | Enigma 2021 | Sunny Consolvo |
| Is Cyber War Legal: A Four Hundred Year Retrospective | Enigma 2021 | Scott Shapiro |
| It's a Trap! How Abstractions Have Failed Us. | SREcon20 Americas | André Henry |
| Panel: Learning from Adaptations to Coronavirus | SREcon20 Americas | Nora Jones, Fred Hebert, Lorin Hochstein, Vanessa Huerta Granda |
| Capacity Planning and Performance Enhancement with Page Reference Sampling | SREcon20 Americas | Danny Chen |
| Achieving Mutual TLS: Secure Pod-to-Pod Communication Without the Hassle | SREcon20 Americas | Mark Hahn, Thomas Hahn |
| Weeks of Debugging Can Save You Hours of TLA+ | SREcon20 Americas | Markus A. Kuppe |
| Achieving the Ultimate Performance with KVM | SREcon20 Americas | Boyan Krosnov |
| A Bartender's Guide to Network Monitoring | SREcon20 Americas | John Blaho |
| Hot Swap Your Datastore: A Practical Approach and Lessons Learned | SREcon20 Americas | Raj Shekhar, Mehmet Can Kurt |