Eddie Schwartz It sure seemed like a visionary idea in the mid-1990’s – cyber security would be taken seriously by inventing a C-suite position. Banks and government agencies cared about security so why not? The CISO was born, and every organization wanted one. But unfortunately expectations and results did not match reality. Does
Leslie Fournier-Dupelle Governments have a unique responsibility when it comes to protecting personal information under their care for one simple reason: you can’t “vote with your feet” when it comes to filing your taxes, applying for benefits, registering to vote and so on. There has been a long understanding, underpinned by
Mike Ahmadi The global expenditure of resources to manage cybersecurity issues continues to grow year over year, yet the cybersecurity challenges we are facing are rapidly outpacing our ability to get them under control. Consumers of software products (including government and business) have become increasingly reliant on software, yet we all
Charlie Miller and Chris Valasek Although the hacking of automobiles is a topic often discussed, details regarding successful attacks, if ever made public, are non-comprehensive at best. The ambiguous nature of automotive security leads to narratives that are polar opposites: either we’re all going to die or our cars are perfectly safe.
Matthew Elder In this talk, we present three research projects conducted by Symantec Research Labs, the global research organization for Symantec, addressing the latest threats and new technologies in cloud and data center security. The first project is obfuscation research in data center security, called ShadowNet, which makes the
Richard Brisson Almost anyone who is knowledgeable on cryptology is typically aware of the WW2 German Enigma and its story in regards to the code-making and code-breaking accomplishments. This talk will cover two threads on Enigma with the first being on what are facts and exaggerations in the recent movie “The Imitation Game” in
Artturi Lehtiö The tools used by advanced threat actors – so-called “APT groups” – are common fodder for whitepapers from information security companies. But what about the tactics of these threat actors? How do they actually use their tools? How do they proceed from the initial compromise of a targeted
Jeffrey Carr This presentation will focus on the active and passive exploitation of the victim company’s supply chain. Real use cases in the areas of aerospace, telecommunications, and government sectors will be presented and discussed. The target in each of these cases is valuable IP or an agency’s Crown Jewels.
Kellman Meghu This is the story of one man’s personal trip to the cloud (and back) as he rebuilds his home network in a devops model, supported by virtual private cloud service. This presentation takes a micro look at cloud services, and the benefits and risks that come along with it for the average home