Can’t Miss Sessions for Black Hat 2017
Black Hat 2017 is going strong today and deception-based detection technology is of high interest from the feedback we’ve received so far at the booth, as well as from meetings with the media and industry analysts.
The week started out with a bang. On Monday, CRN included Attivo Networks on its 2017 Emerging Vendors list, the fourteenth awards recognition we have received this year already.
We were also super excited to see the Attivo booth come together. Have you ever wondered what it is like to be an attacker trapped in a deception environment? We thought it would fun to turn our booth into an attacker altered reality experience. As such, we turned our booth into an interactive deception hall of mirrors, where once nside you will be able to walk through a maze and have fun with interactive mirrors. Don’t forget to take a picture in the selfie display area. We welcome you to come by the Attivo booth (South Hall Booth #454) to check out the experience and to find out how deception plays a critical role in deceiving, detecting and defending against in-network threats.
There are many interesting and highly relevant sessions this week. The top five that caught my eye and are on my must see list are:
Wednesday, July 26 | 9:00 – 10:00 a.m. | Mandalay Bay Events Center
Presenter: Alex Stamos, Chief Security Officer, Facebook
Long gone are the days when “hacking” conjured up a sense of mischief and light-heartedness, with limited risks and harm. The harsh reality of the now is that the security community hasn’t kept pace with the importance of technology in our society, even as the stakes have grown higher than ever. Our adversaries are no longer motivated only by money, personal data or competitive intelligence, but are now driven to use the critical technologies of our lives to arrest journalists and activists, to suppress democracy and manipulate public opinion.
This talk will explore how we can adapt to better confront the obstacles we face as security practitioners.
Wednesday, July 26 | 10:30 – 10:55 a.m. | Mandalay Bay AB
Presenter: April C. Wright, Senior Security and Compliance Manager, Verizon Wireline
Introducing a new paradigm for integrating developers with offensive and defensive teams to enhance SDLC. Utilizing Red, Blue and now Yellow (Development) teams in a structured way to provide knowledge sharing, strengthening of defenses, coverage, and response, and ultimately the development of a high level of security maturity over time. This new concept of “Red + Yellow = Orange” and “Blue + Yellow = Green” focuses on the role of developers as a critical piece of security assurance activities when combined with Offensive and Defensive teams.
This talk will evaluate how different team combinations can lead to more secure software.
Wednesday, July 26 | 1:30 – 2:20 | Mandalay AB
Bill Woodcock, Executive Director of Packet Clearing House, Global Commission on the Stability of Cyberspace
Jeff Moss, Founder and Creator of Black Hat and DEF CON, Global Commission on the Stability of Cyberspace
Joseph Nye, University Distinguished Service Professor, and former Dean of the Harvard Kennedy School of Government, Global Commission on the Security of Cyberspace
Khoo Boon Hui, Former President of INTERPOL, Global Com mission on the Stability of Cyberspace
Marina Kaljurand, Chair of the Global Commission of Cyberpsace, former Minister of Foreign Affairs of Estonia
Wolfgang Kleinwachter, Professor Emeritus, University of Aarhus, Global Commission on the Stability of Cyberspace
Cyberspace is formed and government by a range of different technical and policy communities. A major challenge is insufficient awareness and mutual acceptance among the various communities. The traditional government dialogues on international security, for instance within the United Nations, have struggled to work with this reality when addressing issues of war and peace in cyberspace.
During this talk, the Chair and Commissioners of the recently established Global Commission on the Stability of Cyberspace will address the challenges of cooperating across different communities when addressing issues of international security and cyberspace.
Wednesday, July 26 | 5:05 – 5:30 p.m. | Mandalay Bay EF
Ellie, Bursztein, Anti-Fraud Research Lead, Google
Kylie McRoberts, Senior Strategist, Google
Luca Invernizzi, Research Scientist, Google
Ransomware has rapidly risen to game in the last year, infecting hundreds of thousands of users, locking their documents, and demanding hefty ransoms to get them back. In doing so, it has become one of the largest cybercrime revenue sources, with heavy reliance on Bitcoins and Tor to confound the money trail. This session will demonstrate a method to track the ransomware ecosystem at scale, from distribution sites to the cash-out points.
Thursday, July 27 | 11:00 – 11:50 a.m. | Mandalay Bay GH
Presenter: Arun Vishwanath, Associate Professor, University of Buffalo
To date, the only proactive, user-focused solution against spear phishing has been cyber security awareness training. However, multiple lines of evidence – from continuing news stories of bigger and bolder breaches to objective academic assessments of training effects – point to its limited effectiveness.
Yet, organizations continue to spend millions of dollars and countless man-hours on it. The problem is our current approach of providing the same form of training to everyone: it is akin to prescribing the same medicine to every patient, sometimes, repeatedly.
The presentation will provide a mechanism for answering these questions by using the Cyber Risk Index (CRI), an empirically derived quantitative metric that helps identify the likely victims of different spear phishing attacks, reasons for their victimization and the remedial measures that would best work to protect them.
We look forward to seeing everyone at Black Hat and look forward to having you check out the Hall of Mirrors!
Free Active Directory Assessment
Get Visibility Into Privilege And Service Account Exposure
For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.
Try Our Endpoint Detection Net (EDN) for Free
FAST AND EASY
Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.
ADSecure 90-Day Free Trial
GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY
- Hide and deny access to AD objects
- Get alerted on unauthorized queries
- Attack details easily viewable in dashboard
- Your data remains on-premise