Support Login.

12 − 4 =

 

Can’t Miss Sessions for Black Hat 2017

 

Can’t Miss Sessions for Black Hat 2017

Black Hat 2017 is going strong today and deception-based detection technology is of high interest from the feedback we’ve received so far at the booth, as well as from meetings with the media and industry analysts.

The week started out with a bang. On Monday, CRN included Attivo Networks on its 2017 Emerging Vendors list, the fourteenth awards recognition we have received this year already.

We were also super excited to see the Attivo booth come together. Have you ever wondered what it is like to be an attacker trapped in a deception environment? We thought it would fun to turn our booth into an attacker altered reality experience. As such, we turned our booth into an interactive deception hall of mirrors, where once nside you will be able to walk through a maze and have fun with interactive mirrors. Don’t forget to take a picture in the selfie display area. We welcome you to come by the Attivo booth (South Hall Booth #454) to check out the experience and to find out how deception plays a critical role in deceiving, detecting and defending against in-network threats.

There are many interesting and highly relevant sessions this week.  The top five that caught my eye and are on my must see list are:

 

Stepping Up Our Game:  Re-focusing the Security Community on Defense and Making Security Work for Everyone

Wednesday, July 26 | 9:00 – 10:00 a.m. | Mandalay Bay Events Center

Presenter:  Alex Stamos, Chief Security Officer, Facebook

Long gone are the days when “hacking” conjured up a sense of mischief and light-heartedness, with limited risks and harm. The harsh reality of the now is that the security community hasn’t kept pace with the importance of technology in our society, even as the stakes have grown higher than ever.  Our adversaries are no longer motivated only by money, personal data or competitive intelligence, but are now driven to use the critical technologies of our lives to arrest journalists and activists, to suppress democracy and manipulate public opinion.

This talk will explore how we can adapt to better confront the obstacles we face as security practitioners.

 

Orange Is the New Purple:  How and Why to Integrate Development Teams with Red/Blue Teams to Build More Secure Software

Wednesday, July 26 | 10:30 – 10:55 a.m. | Mandalay Bay AB

Presenter:  April C. Wright, Senior Security and Compliance Manager, Verizon Wireline

Introducing a new paradigm for integrating developers with offensive and defensive teams to enhance SDLC.  Utilizing Red, Blue and now Yellow (Development) teams in a structured way to provide knowledge sharing, strengthening of defenses, coverage, and response, and ultimately the development of a high level of security maturity over time. This new concept of “Red + Yellow = Orange” and “Blue +  Yellow = Green” focuses on the role of developers as a critical piece of security assurance activities when combined with Offensive and Defensive teams.

This talk will evaluate how different team combinations can lead to more secure software.

 

Challenges of Cooperation Across Cyberspace

Wednesday, July 26 | 1:30 – 2:20 | Mandalay AB

Presenters:

Bill Woodcock, Executive Director of Packet Clearing House, Global Commission on the Stability of Cyberspace

Jeff Moss, Founder and Creator of Black Hat and DEF CON, Global Commission on the Stability of Cyberspace

Joseph Nye, University Distinguished Service Professor, and former Dean of the Harvard Kennedy School of Government, Global Commission on the Security of Cyberspace

Khoo Boon Hui, Former President of INTERPOL, Global Com mission on the Stability of Cyberspace

Marina Kaljurand, Chair of the Global Commission of Cyberpsace, former Minister of Foreign Affairs of Estonia

Wolfgang Kleinwachter, Professor Emeritus, University of Aarhus, Global Commission on the Stability of Cyberspace

Cyberspace is formed and government by a range of different technical and policy communities.  A major challenge is insufficient awareness and mutual acceptance among the various communities.  The traditional government dialogues on international security, for instance within the United Nations, have struggled to work with this reality when addressing issues of war and peace in cyberspace.

During this talk, the Chair and Commissioners of the recently established Global Commission on the Stability of Cyberspace will address the challenges of cooperating across different communities when addressing issues of international security and cyberspace.

 

Tracking Malware End to End

Wednesday, July 26 | 5:05 – 5:30 p.m. | Mandalay Bay EF

Presenters:

Ellie, Bursztein, Anti-Fraud Research Lead, Google

Kylie McRoberts, Senior Strategist, Google

Luca Invernizzi, Research Scientist, Google

Ransomware has rapidly risen to game in the last year, infecting hundreds of thousands of users, locking their documents, and demanding hefty ransoms to get them back.  In doing so, it has become one of the largest cybercrime revenue sources, with heavy reliance on Bitcoins and Tor to confound the money trail.   This session will demonstrate a method to track the ransomware ecosystem at scale, from distribution sites to the cash-out points.

 

Why Most Cyber Security Training Fails and What We Can Do about It

Thursday, July 27 | 11:00 – 11:50 a.m. | Mandalay Bay GH

Presenter:  Arun Vishwanath, Associate Professor, University of Buffalo

To date, the only proactive, user-focused solution against spear phishing has been cyber security awareness training.  However, multiple lines of evidence – from continuing news stories of bigger and bolder breaches to objective academic assessments of training effects – point to its limited effectiveness.

Yet, organizations continue to spend millions of dollars and countless man-hours on it. The problem is our current approach of providing the same form of training to everyone:  it is akin to prescribing the same medicine to every patient, sometimes, repeatedly.

The presentation will provide a mechanism for answering these questions by using the Cyber Risk Index (CRI), an empirically derived quantitative metric that helps identify the likely victims of different spear phishing attacks, reasons for their victimization and the remedial measures that would best work to protect them.

We look forward to seeing everyone at Black Hat and look forward to having you check out the Hall of Mirrors!