Medical Device Security

Alex Illiadis MedSec The focus of this presentation is on the security of medical devices. Anything from enterprise hospital equipment to embedded gadgets that are available for patients. We will walk through all the layers of security starting from the hardware, firmware and RF. This talk is a story of our experiences and struggles

Read more

War in the Internet-of-Everything

Dave McMahon Clairvoyance Cyber Corp Astract Consider that the largest mobile device you will soon own will be your car. Picture an aircraft as software with wings, a spaceship as a rocket-propelled supercomputer and navy ships as floating data-centres. Look at augmented reality gaming on our sidewalks, autonomous drones in the sky, bitcoins

Read more

Detecting Reverse Engineering with Canaries

Collin Mulliner Astract Reverse engineering software is commonly done and has various goals such as finding vulnerabilities, learning about security mechanisms and countermeasures, and for general understanding and information extraction. Obviously all software will be reverse engineered at some point but you will never really find out. This

Read more

Cyber Security Incident Response. Are You Ready?

Ken Kuehni and Mark Cunningham Synopsis When a security breach happens to your organization (and it will), the first step in the recovery process is your ability to respond effectively. Being prepared is the key to managing an incident and whether it be a line of business, or the entire corporation, the objective is to 

Read more

When Good Software Goes Bad

Ryan Kazanciyan Tanium Amidst all of the furor and noise about NSA exploits and failed patching efforts, this year’s NotPetya ransomware campaign also revived awareness of a potent and often underestimated means of compromise: software supply chain attacks. In truth, you don’t need to look far to find a surprising number of similar incidents

Read more

Analyzing and Understanding the Criminal Ecosystem

Kevin Stear RSA The concept of capitalism thrives on the open market forces of supply and demand, and these same forces are driving the evolution of today’s Crimeware microcosm, where a close-knit ecosystem of independent actors offers goods and services based on demand from ongoing malicious campaigns. In this discussion, RSA FirstWatch will

Read more