black hat usa 2015: a visual journey

Upload: anonymous-excn0c

Post on 10-Jan-2016

15 views

Category:

Documents


0 download

TRANSCRIPT

  • A VISUAL SNAPSHOT OF SECURITY THREATS, TRENDS AND IDEAS.

  • JEFF POLLARD, LASTLINE

    Integrating Endpoint Workflow to Stop Attacks Before They Start

    Victory does not always require a waged battle. By integrating best-

    of-breed advanced malware analysis and endpoint technologies,

    organizations can effectively identify and stop threats before

    damage occurs.

    @LASTLINEINC

  • DR. JOHN JOHNSON, JOHN DEERE

    Keep Your Company from Becoming Collateral Damage in a Cyberwar

    Knowledge of who is attacking you and what they are after can help you to

    develop an adaptive defense to advanced threats that involves breaking the kill chain to protect sensitive data,

    and more quickly detecting and responding to threats.

    @JOHNDJOHNSON

  • ADAM SHOSTACK, AUTHOR

    Threat Modeling: Lessons from Star Wars

    A simple approach to Threat Modeling can be to start by

    answering these four questions: What are you building/deploying?

    What could go wrong? What are you going to do about it? And, did you do

    a good job?

    @ADAMSHOSTACK

  • TODD BELL, INTERSEC

    Whats the Big Deal with End-Point Security?

    Endpoint security is becoming a must have for enterprises.

    However, not all endpoint products are created equal. Know what to look for when selecting a vendor,

    including API integration with existing tools sets and sandboxing

    malware.

    @INTERSECGROUP

  • TERRY RAMOS, PALO ALTO NETWORKS

    Enhanced Protection For Your Critical Servers

    Reduce the time to detect and protect against advanced threats

    from the network edge to endpoint systems. With Tripwire Enterprise and Palo Alto Networks WildFire, you get unprecedented protection

    against zero-day exploits.

    @PALOALTONTWKS

  • CRAIG YOUNG, TRIPWIRE

    Black Ops Recon: Finding Your Faults First

    Adding fuzzing to your security test framework plenty of benefits. Inexpensive cloud computing resources were used to find

    exploitable flaws in open source software at a cost of less than $0.25

    per vulnerability.

    @CRAIGTWEETS

  • QUINN SHAMBLIN, BOSTON UNIVERSITY

    Know Then Thyself: Using the Top 4 Critical Controls for

    Effective Cyber Defense

    Provide a product line that directly targets the Top 4 Critical Security Controls. The DBIR says only 10

    vulnerabilities account for 99% of breaches, meaning many organizations

    are still not getting the essentials right.

    @BUINFOSEC

  • DR. KEN BAYLOR,STEALTH WORKER

    Cybercrime Tools: New Uses and Abuses

    @BAYLORSECURITY

    Modern botnets are a major threat in the global financial space,

    responsible for stealing several hundred million dollars and billions in intellectual property. For smaller

    banks, botnets can be business-ending.

  • TRAVIS SMITH, TRIPWIRE

    My Bro the ELK: Obtaining Context from Security Events

    @MRTRAV

    Using commercial and open-source threat intelligence tools, the

    TARDIS framework allows you to gather additional intelligence from your current security infrastructure in order to detect historic and real-

    time indicators of compromise.

  • JAMES BRODSKY, SPLUNK

    Tripwire + Splunk: Partnering to Provide You with Better Security

    Intelligence

    @JAMES_BRODSKY

    Integrating Splunk with Tripwire provides the ability to easily visualize

    the overall health of your IT environment to help reduce the cycle-

    time of identifying vulnerabilities, security violations and mean time to

    identify and remediate risks.

  • DAVID NEWMAN, TELUS

    Turning Admins into Cyber Defenders

    @TELUS

    By developing defensive capabilities and situational awareness, Admins learn to detect and react quickly to

    any attack. Operationalizing security means they become participants, who are engaged and trained for

    cyberwar.

  • KELLY KINGMAN, KINGMNAN INK

    Kelly is a graphic recorder that creates visual summaries of spoken content like talks,

    discussions, and meetings. Her visuals stimulate creativity and

    collaboration to help the audience retain and understand

    information.

    @KINGMANINK

  • FOR THE LATEST SECURITY NEWS, TRENDS AND INSIGHTS,

    VISIT US AT:

    WWW.TRIPWIRE.COM/BLOG @TRIPWIREINC

    IMAGE COURTESY OF SHUTTERSTOCK.COM