Locknote Conclusions and Key Takeaways From Black Hat Europe 2017

Subscribers:
6,600
Published on ● Video Link: https://www.youtube.com/watch?v=0SWOV2KsZmc



Duration: 44:12
2 views
0


Black Hat - Europe - 2017 Hacking conference
Presenters:
Jeff Moss / The Dark Tangent - Founder and Creator of Black Hat and DEF CON, Global Commission on the Stability of Cyberspace   as Jeff Moss
A career spent at the intersection of hacking, professional cybersecurity and Internet governance gives Jeff Moss a unique perspective on information security. Mr. Moss is the founder and CEO of the DEF CON hacker conference and the founder of Black Hat Briefings, two of the world's most influential information security events. Mr. Moss also served as the CSO/VP of ICANN (the Internet Corporation for Assigned Names and Numbers). His corporate experience includes work with Ernst & Young. LLC and a directorship at Secure Computing. Mr. Moss serves on the Board of Directors for Compagnie Financière Richemont SA and is an angel investor to startups in the security space. Mr. Moss actively seeks out opportunities to help shape the infosec conversation. He is currently a member of the US Homeland Security Advisory Council and the Global Council on the Stability of Cyberspace. He is a Nonresident Senior Fellow at the Atlantic Council, a lifetime member of the Council on Foreign Relations and a member of the World Economic Forum's Global Agenda Council on Cyber Security.
Shawn Moyer - Founding Partner, Atredis Partners
Shawn Moyer is a Founding Partner at Atredis Partners, a private security research and software security consultancy created with frequent BlackHat speakers Josh Thomas and Nathan Keltner, performing on-spec vulnerability research and reverse engineering as well as advanced penetration testing for clients all over the world. Shawn has been involved professionally in information security for 20 years, and unprofessionally for longer than he'd care to admit. Shawn's most recent work has focused on mobile and embedded security, as well as continued work with Smart Grid, SCADA, and other industrial technologies. Previously, Shawn created the Applied Research at Accuvant Labs, helped launch the Penetration Testing practice at FishNet Security, and has written on emerging threats and other topics for Information Security Magazine and ZDNet. Shawn's research has been featured in the Washington Post, BusinessWeek, NPR, and the New York Times, as well as countless other industry publications. Shawn has been a ten-time speaker at the BlackHat Briefings, and has been an invited speaker at other notable security conferences in the US, China, Canada, and Japan. Shawn has been a member of the Black Hat Briefings Review Board since 2008.
Sharon Conheady - Director, First Defence Information Security
Sharon Conheady is the director of First Defence Information Security and a founding member of The Risk Avengers. She specialises in the human side of security and has social engineered her way into dozens of organisations across the UK and abroad, including company offices, sports stadiums, government facilities and more. Sharon has presented at security conferences including DEF CON social engineering village, Deepsec, Recon, CONFidence and InfoSec. She is the author of Social Engineering in IT Security: Tools, Tactics, and Techniques published by McGraw-Hill.
Andreas Lindh - Vulnerability Researcher & Consultant, Recurity Labs GmbH
Andreas Lindh is a vulnerability researcher and consultant, currently working for Recurity Labs GmbH. He has over a decade of applied security experience, spanning areas such as application security, vulnerability research, network intrusion detection, incident response, and malware analysis. Andreas helped co-found Security Without Borders, a collective of hackers, developers, and security professionals, working pro bono to offer security assistance to organizations and people fighting for human rights. He has presented his work at conferences such as, among others, Black Hat USA, Troopers, and Security Fest.
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-21Math and Cryptography Sam Gross
2021-12-21Abusing Google Dorking and Robotstxt Dave Comstock fixed by Frank Trezza
2021-12-21Abusing Google Dorking and Robotstxt Dave Comstock
2021-12-21APT What the heck is an APT Bill Barnes
2021-12-21Securely Deleting Data from SSDs Stephen Larson
2021-12-21Strange times we live in Alexander Muentz
2021-12-21Technological Changes that Affect Forensic Investigations Diane Barrett BloomCon - 2017
2021-12-20Breaking Bad Stealing Patient Data Through Medical Devices
2021-12-20Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming
2021-12-20The Apple of Your EFI An Updated Study of EFI Security
2021-12-20Locknote Conclusions and Key Takeaways From Black Hat Europe 2017
2021-12-20Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing
2021-12-20Exfiltrating Reconnaissance Data from Air Gapped ICS SCADA Networks
2021-12-20Key Reinstallation Attacks Breaking the WPA2 Protocol Black Hat - Europe - 2017
2021-12-20Self Verifying Authentication A Framework For Safer Integrations of Single Sign On Services
2021-12-20Jailbreaking Apple Watch Black Hat - Europe - 2017
2021-12-20BlueBorne A New Class of Airborne Attacks that can Remotely Compromise Any Linux IoT Device
2021-12-20Automating Incident Response
2021-12-20Detach Me Not DoS Attacks Against 4G Cellular Users Worldwide from your Desk
2021-12-20Mobile Espionage in the Wild Pegasus and Nation State Level Attacks
2021-12-20Real World Post Quantum Cryptography Introducing the OpenQuantumSafe Software Project



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering