takeaways from black hat 2016

9
BLACK HAT © 2016 BROUGHT TO YOU by

Upload: tripwire

Post on 13-Apr-2017

5.944 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Takeaways from Black Hat 2016

BLACK HAT © 2016

BROUGHT TO YOU by

Page 2: Takeaways from Black Hat 2016

MANDY HUTH

A GRANDMASTER CHESS STRATEGY FOR

INDUSTRIAL CONTROLS

Belden Director of Cybersecurity Mandy Huth

takes tactics from both sides of the chessboard and reviews strategies

that both IT and OT teams can learn from and

leverage. These real-world examples and strong

strategies can help every infosec professional

improve their tactics.

@cyberfortress

Page 3: Takeaways from Black Hat 2016

ALEX COX

CUTTING EDGE SEC-OPS: TECHNIQUES FOR

MODERNIZING INCIDENT & VULNERABILITY RESPONSE

Alex Cox, principal security

architect at ServiceNow, shares methods for enhancing security

operations via automated workflows, business intelligence, network

visualization, cross-system orchestration and more.

@servicenow

Page 4: Takeaways from Black Hat 2016

JOEL EBRAHIMI

COMPLETE DEFENSE: GROUND TROOPS WITH AIR

SUPPORT

Blue Coat’s Joel Ebrahami shares practical and

effective advice on how to eliminate blind spots from

network to endpoint, how to achieve faster incident

response through tighter integration, and how to create stronger security

through technology partnerships.

@bluecoat

Page 5: Takeaways from Black Hat 2016

ED SMITH

ARCHITECTING A RISK & VULNERABILITY MANAGEMENT

SOLUTION FOR RESILIENCE

With more to protect, fewer resources and more data, scan

failures, delays and false positives can impact response

during critical incidents. Tripwire’s Ed Smith shares

three key challenges to building resiliency in your

organization's vulnerability management program, and how

to overcome them.

@edsmithyes

Page 6: Takeaways from Black Hat 2016

CRAIG YOUNG

SECURITY DEATHMATCH: SOHO VS ENTERPRISE

There is a prevalent

assumption that SOHO routers lack security because

they are low-cost consumer products and that enterprise-grade equipment is superior. Tripwire researchers put this

notion to the test and revealed dozens of 0-day flaws in enterprise-class Ruckus routers, some of

which are strikingly similar to those in consumer devices.

@craigtweets

Page 7: Takeaways from Black Hat 2016

DIEU TRAN

HEALTH CHECK FOR YOUR SECURITY SYSTEM

Dieu Tran, director of IT risk and data analytics at Mercy Health, provides insight and

consulting guidance to comply with regulatory and

operational standards for IT security. Tran shares Mercy

Health’s story on how it achieved a successful audit

and compliance efforts, while overcoming organizational and operational challenges.

@mercyoklahoma

Page 8: Takeaways from Black Hat 2016

DAVID NEWMAN

DEFEND THE ENDS BY STARTING AT THE START

David Newman walks through the eight key

steps for implementing an effective endpoint

security program -- from defining compliance and

building provably compliant devices and services to constantly

measuring, evaluating and reporting.

@telus

Page 9: Takeaways from Black Hat 2016

For the latest security news

trends and insights visit

@TRIPWIREINC

, :

TRIPWIRE.COM/BLOG