Black Hat //Webcast 32
Black Hat USA 2011 Wrap
// Alex Stamos, Katie Moussouris, Jerome Radcliffe
Register for the free Aug 25th webcast and you could win one of 25 Black Hat sweatshirts. See details below
Downloads:
Macs in the Age of the APT by Alex Stamos + Aaron Grattafiori + Tom Daniels + Paul Youn + B.J. Orvis
From Redmond with Love by Katie Moussouris
Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System by Jerome Radcliffe
Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System by Jerome Radcliffe
Overview:
This webcast will be a wrap up of Black Hat USA 2011 and will feature some of the key presentations from the live event. Several of the speakers will discuss their work and give you a chance to ask any questions you weren't able to in Vegas. Confirmed Speakers/Presentations include:
Macs in the age of APT
By Alex Stamos, Co-Founder and CTO of iSEC Partners Inc.
From Redmond with Love
By Katie Moussouris, Security Community Outreach and Strategy Team Lead at Microsoft
Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System
By Jerome Radcliffe, SecureConcern
speakers:
Alex Stamos is a co-founder and CTO of iSEC Partners Inc., a strategic digital security organization and part of the NCC Group. Alex is an experienced security engineer specializing in solving difficult problems in application security and is a leading researcher in the field of cloud and mobile security. He has been a featured speaker at top industry conferences such as Black Hat, FS-ISAC, the CIP Congress, Infraguard, Web 2.0 Expo, CanSecWest, DefCon, SyScan, Microsoft BlueHat, Amazon ZonCon and OWASP App Sec. He holds a BSEE from the University of California, Berkeley.
Katie Moussouris leads the Security Community Outreach and Strategy team at Microsoft. Her team's work encompasses Security Ecosystem Strategy programs such as Microsoft's BlueHat conference and worldwide hacker conference engagement, security researcher outreach, and Microsoft's Vulnerability Disclosure Policies. Katie also founded and runs Microsoft Vulnerability Research, which is responsible for Microsoft's research and reporting of vulnerabilities in 3rd party software. Katie recently was voted the editor of a new draft ISO standard on Vulnerability Handling Processes, following her work over the past 4 years as the lead expert in the US National Body on an ISO draft standard on Vulnerability Disclosure.
Jerome Radcliffe has been working in the computer security field for over twelve years and is currently a Senior Threat Intelligence Analyst for a major computer security organization. He has an extensive public speaking background, going back to middle school, and has spoken on a variety of security and legal topics at major conferences, universities, and other community events. He holds a Masters degree in Information Security Engineering form SANS Technology Institute as well as a bachelor's degree in Criminal Justice/Pre-Law from Wayne State University. His experience with radios and hardware goes back to when he was 12 and earned his Ham Radio license, now with the callsign N8OS.
sponsor guest:
Alex Horan, Product Manager, Core Security Technologies, is responsible for driving development of Core's desktop family of automated security testing solutions, including design of the products' functional capabilities and technical architecture.
sponsor:
We would like to thank this month's webcast sponsor Core Security Technologies. Core Security Technologies provides organizations with real-world security intelligence. In today's highly secured organizations, there is no shortage of available security data, but there is a shortage of security intelligence. Core's security test and measurement solutions fill the gap between the mass of security data and the intelligence to constantly know where the real exposures reside. Core's customers gain real intelligence and visibility into their security standing, real validation of their security controls, and real metrics to more effectively secure their organizations and manage IT risks.
Core Security's software solutions are used by more than a thousand commercial and government organizations. Solutions range from desktop software tools for technical security experts to infrastructure-wide automated testing and measurement platforms and services that leverage over a decade of trusted research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Core Security Technologies can be reached at +1 (617) 399-6980 or on the Web at: http://www.coresecurity.com
Register and you could win a Black Hat sweatshirt:
Register for the free Aug 25th webcast and you'll automatically be entered to win one of 25 Black Hat sweatshirts. The winner will be drawn after the live webcast and will be notified via email.