Executive Briefings

Over eighty Black Hat sessions crowded into two days is a lot. So it helps to get some advance sorting and some info-distillation—those are the key missions of the Executive Briefings. We have designed the day to help parse the information deluge, guiding your team deployment strategy for team members who have accompanied you to Black Hat.

  • Web application security

    With over twenty sessions impacting Application Security, and facing the evolution of HTML5, Nathan Hamiel will be providing an overview of what is coming in this fast moving space.

    Black Hat Review Board member Nathan Hamiel is charing the Web Application Security track, serves as Principal Consultant for FishNet Security's Application Security Practice. He is also an Associate Professor of Software Engineering at the University of Advancing Technology.

    Presented By:
    Nathan Hamiel

  • mobility

    Mobile devices were among the first 'bring your own device' landscape, and have evolved into one of the more interesting attack targets in the Enterprise. It is true that the mobile track includes elements you might expect, but there are more unconventional topics emerging as well. Vincenzo, the track chair, says it all has something to do with peeling an onion.

    Presentation by Black Hat Review Board member Vincenzo Iozzo, Director of Vulnerability Intelligence at Trail Of Bits Inc. He's perhaps best known for co-writing the exploits for BlackBerryOS and iPhoneOS to win Pwn2own 2010 and Pwn2own 2011.

    Presented By:
    Vincenzo Iozzo

  • Things Defensive

    Defense doesn't always get as much airplay at Black Hat, where much of the buzz tends to focus on breaking things. Defense, always harder than offense, gets attention from some great minds at Black Hat this year.

    Presentation by Black Hat Review Board member Shawn Moyer, who manages the Research Consulting Practice for Accuvant Labs.

    Presented By:
    Shawn Moyer

  • Special Guest Speaker

    An update on national issues from DHS Deputy Under Secretary for Cybersecurity Mark Weatherford.

    Presented By:
    Mark Weatherford

  • Analytical Response and Discussion

    Rounding out the day's discussions and presentations, Black Hat has assembled a top-shelf panel to break down and discuss top concerns highlighted through the day, evaluate down-stream implications of upcoming Black Hat research, and help process what to do in response to this year's content.

    This panel, comprised of three leading analysts and two (crowd elected) CSO's are charged with working with the attendees to synthesize, challenge, clarify what questions to carry forward into the next two days of Black Hat Briefings.

    Joshua Corman is Director of Security Intelligence for Akamai Technologies and has more than a decade of experience with security and networking software. Most recently he served as Research Director for Enterprise Security at The 451 Group, following his time as Principal Security Strategist for IBM Internet Security Systems. Mr. Corman's cross-domain research highlights adversaries, game theory, and motivational structures. His analysis cuts across sectors to the core security challenges plaguing the IT industry, and helps drive evolutionary strategies toward emerging technologies and shifting incentives.
    Corman can be found on twitter @joshcorman and on his blog at http://blog.cognitivedissidents.com/

    Rob Joyce is the Deputy Director of the Information Assurance Directorate (IAD) at the National Security Agency. His organization is the NSA mission element charged with providing products and services critical to protecting our Nation's systems that carry classified communications, military command and control or intelligence information. IAD provides technical expertise on cyber technologies, cryptography, security architectures and other issues related to information assurance, as well as supplying deep understanding of the vulnerability and threats to national security systems. Joyce has spent more than 23 years at NSA, beginning his career as an engineer.

    Rich Mogull, Analyst and CEO at Securosis, has twenty years of experience in information security, physical security, and risk management. He specializes in data security, application security, emerging security technologies, and security management. Prior to founding Securosis, Rich was a Research Vice President at Gartner on the security team where he also served as research co-chair for the Gartner Security Summit. Rich is the Security Editor of TidBITS and a frequent contributor to publications ranging from Information Security Magazine to Macworld. He is a frequent industry speaker at events including the RSA Security Conference and DefCon, and has spoken on every continent except Antarctica.

    Kevin Overcash, Chief Software Architect of Accuvant, has been designing and building commercial software products and services for over fifteen years. Starting with Internet Security Systems' (ISS) Internet Scanner in the late 90's, he has designed and served as product manager for ISS RealSecure IDS, SPI Dynamics WebDefend and Assessment Management Platform (AMP), Breach Security WebDefend Web Application Firewall, and most recently the WhiteHat Sentinel Web Application Assessment Service. Mr. Overcash has been speaking at industry events for over a decade, including SANS and RSA.
    Presented By:


Premium & Dinner Co-SponsorBack to Top

Foundation SponsorBack to Top

event sponsorsBack to Top

Dinner Co-SponsorBack to Top