Webinar

Black Hat USA Preview Webcast


Thursday, July 17, 2014

11:00 AM - 12:00 PM PDT

60 minutes, including Q&A


THE NEW SCOURGE OF RANSOMWARE: A STUDY OF CRYPTOLOCKER AND ITS FRIENDS by Lance James
HACKING THE WIRELESS WORLD WITH SOFTWARE DEFINED RADIO - 2.0 by Balint Seeber
LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT by Jesus Molina

Black Hat's July Webcast features previews from some of the hottest talks that will be presented at Black Hat USA 2014. Register now for this free Black Hat Webcast and get an exclusive sneak peak of the latest research that will be presented August 6th & 7th at the Mandalay Bay Convention Center in Las Vegas. Each panelist will be given 10 minutes to highlight key takeaways from their upcoming conference session. Webcast registrants can also participate in a live Q&A session with the panelists to discover even more details.

For those of you attending Black Hat USA this summer, you'll get a first look at three brand new Briefings from the speakers themselves. If you're looking to learn more about the show (and what you might be missing), this is a great opportunity to preview the cutting edge security research that makes Black Hat the most relevant information security conference in the world.

Check out the three Talks which were handpicked by the Black Hat Team for this year's installment of the "Black Hat USA Preview" online event:

PREVIEW 1: THE NEW SCOURGE OF RANSOMWARE: A STUDY OF CRYPTOLOCKER AND ITS FRIENDS… READ MORE
Presenter: Lance James

PREVIEW 2: HACKING THE WIRELESS WORLD WITH SOFTWARE DEFINED RADIO - 2.0… READ MORE
Presenter: Balint Seeber

PREVIEW 3: LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT... READ MORE
Presenter: Jesus Molina

Sponsor Presentation:

Negative Consequences: Don't Ignore the most overlooked attack vector or your protection.

Whether your business is oil and gas, electrical, chemical, pharmaceutical, healthcare or financial, one of the most overlooked and easiest attack vectors for business disruption and intellectual property theft is both the endpoint (Laptop, Smartphone, Tablet) and critical elements of Industrial Controls (like PLCs, SCADA and other elements).

The world is recognizing that endpoint and embedded alert and protection solutions are woefully inadequate. As new devices come ‘online' the challenges of device type, version control, patching, access rights become huge holes for attackers. Many IT personnel are giving up on the endpoint security due to its low efficacy.

However new, proactive protection approaches are supplanting traditional models. These include math and machine learning, virtualization and containerization. The key is to understand what can actually detect advanced threats and take action to block them from ever initiating. Cylance has produced a game changing approach to detecting and preventing advanced threats.

Brought to you by:

Cylance

Sponsor Speaker:

Eric Cornelius

Eric Cornelius is the Director of Critical Infrastructure and Industrial Control Systems (ICS) at Cylance, Inc. He is responsible for the architecture and consulting implementations for the Company. Previously, Eric served as the Deputy Director and Chief Technical Analyst for the Control Systems Security Program at the US Department of Homeland Security. Eric brings a wealth of ICS knowledge to the Cylance team. In addition to his years of technical leadership, Eric literally wrote the book on incident response in the ICS arena.

Eric is the co-author of "Recommended Practice: Creating Cyber Forensics Plans for Control Systems" as part of the DHS National Cyber Security Division, Control Systems Security Program, 2008. He is also a frequent speaker and instructor at ICS events across the globe.

Sustaining Partners