Risk

5/23/2013
02:26 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Black Hat: Chief Engineer of NASA's Jet Propulsion Laboratory To Keynote Day Two Of Black Hat USA 2013

Brian Muirhead has unique experience in solving the challenges of both robotic and human exploration of space

SAN FRANCISCO, May 23, 2013 /PRNewswire/ -- Today, Black Hat, the world's leading family of information security events, announced that Brian Muirhead, Chief Engineer, NASA's Jet Propulsion Laboratory, and former manager of the Mars Pathfinder Mission as well as the former Chief Architect of the Constellation program, will present the Day Two keynote address at Black Hat USA 2013. Black Hat USA will take place July 27 – August 1, 2013, at Caesars Palace in Las Vegas. For more information and to sign up for early registration by May 31, please visit http://www.blackhat.com/us-13/.

A recipient of two of NASA's Outstanding Leadership Medals, Brian Muirhead has unique experience in solving the challenges of both robotic and human exploration of space. He led the team that built the Mars Pathfinder that landed in 1997, bringing worldwide acclaim and initiating a new era of exploration of the surface of Mars. Mr. Muirhead was the Chief Engineer of the Mars Science Laboratory where he helped with the invention of the Sky Crane, which was used to land the rover, "Curiosity," on Mars in 2012. His role as Chief Architect on the Constellation Program brought his experience in deep space robotic missions to bear on the challenges of human spaceflight beyond Earth orbit. Mr. Muirhead is also the author of two highly regarded books – Going to Mars and High Velocity Leadership.

"The key to taking risk and not failing is innovation - being creative in both what you do and how you do it. Mission success comes from having the right team, a sound architecture and careful execution," explained Brian Muirhead, Chief Engineer, NASA's Jet Propulsion Laboratory. "There are unknowns in every environment; particularly in the exploration of space. Cyber security represents a very challenging new environment for developers and operators of information systems."

Mr. Muirhead will take the keynote stage at Black Hat USA on August 1, 2013. In his talk titled, "Take Risk, Don't Fail," Mr. Muirhead will discuss how the combination of calculated risk taking, the application of well tested technology and a trusted team of experts yielded extraordinary successes for space exploration. This keynote address will also celebrate the one-year anniversary of the spectacular landing of Curiosity, the Mars rover that landed on August 5, 2012. In this inspiring talk, Mr. Muirhead will illustrate for attendees the techniques that have made him an award-winning leader and innovator while also sharing the excitement and challenges of space exploration.

"Mr. Muirhead is someone who has effectively done the impossible. From igniting some of the brightest minds in space exploration to overcoming huge odds of putting spacecraft on Mars, he will surely bring lessons learned unlike any we've heard before," explained Trey Ford, General Manager, Black Hat. "The challenges faced by Mr. Muirhead's teams at JPL and NASA are kindred to our own - executing against unforgiving odds while managing the unpredictable. I couldn't be more excited about hearing his perspective as well as the conversations to follow."

This year Black Hat USA will welcome security experts, public and private sector security professionals and underground hackers to Las Vegas for a first-hand look at groundbreaking new research, vulnerabilities and security tools from around the world. Sponsors of Black Hat USA include Diamond Sponsors: Microsoft, Qualys, RSA; Platinum Plus Sponsors: Accuvant LABS, Alien Vault, Cisco, Core Security, LogRhythm, Looking Glass; Platinum Sponsors: Blue Coat, IBM, Lieberman Software, Solera Networks, Symantec and Trustwave.

For more information and to register for Black Hat USA 2013, please visit: http://www.blackhat.com/us-13/.

Connect with Black Hat

Twitter: https://twitter.com/BlackHatEvents - hashtag #BlackHat

Facebook: http://www.facebook.com/blackhat

LinkedIn Group: http://www.linkedin.com/groups?home=&gid=37658

Flickr: http://www.flickr.com/photos/blackhatevents/

About Black Hat

For more than 15 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global events and trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, and are produced by UBM Tech. More information is available at: http://www.blackhat.com.

About UBM Tech

UBM Tech is a global media business that brings together the world's technology industry through live events and online properties. Its community-focused media and events provide expertly curated content along with user-generated content and peer-to-peer engagement opportunities through its proprietary, award-winning DeusM community platform. UBM Tech's brands include EE Times, Interop, Black Hat, InformationWeek, Game Developer Conference, CRN, and DesignCon. The company's products include research, education, training, and data services that accelerate decision making for technology buyers. UBM Tech also offers a full range of marketing services based on its content and technology market expertise, including custom events, content marketing solutions, community development and demand generation programs. UBM Tech is a part of UBM (UBM.L), a global provider of media and information services with a market capitalization of more than $2.5 billion.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Data Privacy Careers Are Helping to Close the IT Gender Gap
Dana Simberkoff, Chief Compliance and Risk Management Officer, AvePoint, Inc,  8/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10006
PUBLISHED: 2018-08-20
Jsish version 2.4.65 contains a CWE-476: NULL Pointer Dereference vulnerability in Function jsi_ValueCopyMove from jsiValue.c:240 that can result in Crash due to segmentation fault. This attack appear to be exploitable via a crafted javascript code. This vulnerability appears to have been fixed in 2...
CVE-2018-10006
PUBLISHED: 2018-08-20
The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This ...
CVE-2018-10006
PUBLISHED: 2018-08-20
Rust Programming Language Rust standard library version Commit bfa0e1f58acf1c28d500c34ed258f09ae021893e and later; stable release 1.3.0 and later contains a Buffer Overflow vulnerability in std::collections::vec_deque::VecDeque::reserve() function that can result in Arbitrary code execution, but no ...
CVE-2018-10006
PUBLISHED: 2018-08-20
JabRef version <=4.3.1 contains a XML External Entity (XXE) vulnerability in MsBibImporter XML Parser that can result in disclosure of confidential data, denial of service, server side request forgery, port scanning. This attack appear to be exploitable via Specially crafted MsBib file. This vuln...
CVE-2018-10006
PUBLISHED: 2018-08-20
zzcms version 8.3 and earlier contains a SQL Injection vulnerability in zt/top.php line 5 that can result in could be attacked by sql injection in zzcms in nginx. This attack appear to be exploitable via running zzcms in nginx.