takeaways from black hat 2016
TRANSCRIPT
BLACK HAT © 2016
BROUGHT TO YOU by
MANDY HUTH
A GRANDMASTER CHESS STRATEGY FOR
INDUSTRIAL CONTROLS
Belden Director of Cybersecurity Mandy Huth
takes tactics from both sides of the chessboard and reviews strategies
that both IT and OT teams can learn from and
leverage. These real-world examples and strong
strategies can help every infosec professional
improve their tactics.
@cyberfortress
ALEX COX
CUTTING EDGE SEC-OPS: TECHNIQUES FOR
MODERNIZING INCIDENT & VULNERABILITY RESPONSE
Alex Cox, principal security
architect at ServiceNow, shares methods for enhancing security
operations via automated workflows, business intelligence, network
visualization, cross-system orchestration and more.
@servicenow
JOEL EBRAHIMI
COMPLETE DEFENSE: GROUND TROOPS WITH AIR
SUPPORT
Blue Coat’s Joel Ebrahami shares practical and
effective advice on how to eliminate blind spots from
network to endpoint, how to achieve faster incident
response through tighter integration, and how to create stronger security
through technology partnerships.
@bluecoat
ED SMITH
ARCHITECTING A RISK & VULNERABILITY MANAGEMENT
SOLUTION FOR RESILIENCE
With more to protect, fewer resources and more data, scan
failures, delays and false positives can impact response
during critical incidents. Tripwire’s Ed Smith shares
three key challenges to building resiliency in your
organization's vulnerability management program, and how
to overcome them.
@edsmithyes
CRAIG YOUNG
SECURITY DEATHMATCH: SOHO VS ENTERPRISE
There is a prevalent
assumption that SOHO routers lack security because
they are low-cost consumer products and that enterprise-grade equipment is superior. Tripwire researchers put this
notion to the test and revealed dozens of 0-day flaws in enterprise-class Ruckus routers, some of
which are strikingly similar to those in consumer devices.
@craigtweets
DIEU TRAN
HEALTH CHECK FOR YOUR SECURITY SYSTEM
Dieu Tran, director of IT risk and data analytics at Mercy Health, provides insight and
consulting guidance to comply with regulatory and
operational standards for IT security. Tran shares Mercy
Health’s story on how it achieved a successful audit
and compliance efforts, while overcoming organizational and operational challenges.
@mercyoklahoma
DAVID NEWMAN
DEFEND THE ENDS BY STARTING AT THE START
David Newman walks through the eight key
steps for implementing an effective endpoint
security program -- from defining compliance and
building provably compliant devices and services to constantly
measuring, evaluating and reporting.
@telus
For the latest security news
trends and insights visit
@TRIPWIREINC
, :
TRIPWIRE.COM/BLOG