Black Hat USA Preview Webcast
Thursday, July 17, 2014
1100 HRS PDT/1400 HRS EDT • FREE
60 MINUTES INCLUDING Q&A
Brought to you by:
THE NEW SCOURGE OF RANSOMWARE: A STUDY OF CRYPTOLOCKER AND ITS FRIENDS by Lance James
HACKING THE WIRELESS WORLD WITH SOFTWARE DEFINED RADIO - 2.0 by Balint Seeber
LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT by Jesus Molina
Black Hat's July Webcast features previews from some of the hottest talks that will be presented at Black Hat USA 2014. Register now for this free Black Hat Webcast and get an exclusive sneak peak of the latest research that will be presented August 6th & 7th at the Mandalay Bay Convention Center in Las Vegas. Each panelist will be given 10 minutes to highlight key takeaways from their upcoming conference session. Webcast registrants can also participate in a live Q&A session with the panelists to discover even more details.
For those of you attending Black Hat USA this summer, you’ll get a first look at three brand new Briefings from the speakers themselves. If you’re looking to learn more about the show (and what you might be missing), this is a great opportunity to preview the cutting edge security research that makes Black Hat the most relevant information security conference in the world.
Check out the three Talks which were handpicked by the Black Hat Team for this year’s installment of the “Black Hat USA Preview” online event:
Negative Consequences: Don't Ignore the most overlooked attack vector or your protection.
Whether your business is oil and gas, electrical, chemical, pharmaceutical, healthcare or financial, one of the most overlooked and easiest attack vectors for business disruption and intellectual property theft is both the endpoint (Laptop, Smartphone, Tablet) and critical elements of Industrial Controls (like PLCs, SCADA and other elements).
The world is recognizing that endpoint and embedded alert and protection solutions are woefully inadequate. As new devices come ‘online’ the challenges of device type, version control, patching, access rights become huge holes for attackers. Many IT personnel are giving up on the endpoint security due to its low efficacy.
However new, proactive protection approaches are supplanting traditional models. These include math and machine learning, virtualization and containerization. The key is to understand what can actually detect advanced threats and take action to block them from ever initiating. Cylance has produced a game changing approach to detecting and preventing advanced threats.
Eric Cornelius is the Director of Critical Infrastructure and Industrial Control Systems (ICS) at Cylance, Inc. He is responsible for the architecture and consulting implementations for the Company. Previously, Eric served as the Deputy Director and Chief Technical Analyst for the Control Systems Security Program at the US Department of Homeland Security. Eric brings a wealth of ICS knowledge to the Cylance team. In addition to his years of technical leadership, Eric literally wrote the book on incident response in the ICS arena.
Eric is the co-author of “Recommended Practice: Creating Cyber Forensics Plans for Control Systems” as part of the DHS National Cyber Security Division, Control Systems Security Program, 2008. He is also a frequent speaker and instructor at ICS events across the globe.