Perimeter
7/30/2012
06:25 PM
Rich Mogull
Rich Mogull
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Black Hat's Future Is The Past

Black Hat has changed a lot over the years. Now, more than ever, we need it to stick to its roots

I still remember the first time I attended Black Hat. It was back when I was still working for Gartner, and at the time was considered a "rogue" conference that bordered on the illegal due to its occasional inclusion of former convicted hackers on the speaking agenda. Good, clean, white-collar analysts from Gartner most definitely weren't supposed to mingle with the underground, even those of us with hacker roots.

It took all of a nanosecond at the event to realize how wrong those characterizations were, and since then, Black Hat has become such a fixture on my annual calendar that even eighth cousins, thrice removed, know better than to try and schedule anything that week. Black Hat has grown into one of the most significant events in security: one that plays a nearly unique role in our industry by bridging the gap between enterprise security professionals and the researcher/hacker community.

But with this expansion comes the inevitable growing pains. After spending last week at Black Hat (and Def Con), I think the future of the conference will be a return to the core principles it was created for -- not, as my partner Mike Rothman suggests, a choice between focusing on the research or targeting CISOs. In my mind, it needs to do both.

(Mike and I may work together, but we don't censor at Securosis. We don't have any problem airing our dirty laundry in public and letting you decide who you agree with.)

Black Hat originally started as a way to bring the research of Def Con to enterprise and government IT security professionals. Not everyone can get approval to spend a weekend in Vegas at the world's biggest hacker conference, so founder Jeff Moss spun up a separate, related, event more-fitting a corporate and agency crowd. The core concept of Black Hat was to take the best of the research from the hacker community to the enterprise and government world. We have other enterprise security conferences, and other hacker cons, but Black Hat is one of the only to deliberately bridge these communities. (And yes, I know I'm being a bit idealistic here).

After spending last week at both events, it's clear a lot has changed. There's still some great research, but today's economics now drive some of the most important behind government, corporate, or criminal walls. More attendees are higher up on the corporate food chain, and the appeal isn't just to the front-line technical defenders. (We had 130 CISO in the Executive Briefing session I moderated the day before the main conference, with a substantial waiting list.) The vendor floor is an actual room, not a bunch of booths crammed into a crowded hallway. For the first time there was a defense track, which was often standing-room only, even in sessions where the technical content was weaker.

While Black Hat was originally established to bring offensive research to defenders, in many ways for much of its existence it was by researchers for researchers, with defenders as more of an afterthought there to pay the bills (at the Briefings at least, not the Trainings classes held beforehand). As the conference has grown, especially in the past few years, and garnered more corporate attention, the pressure is on to figure out exactly where it fits.

I agree with Mike that Black Hat sits at a crossroads. The audience is changing, the content is changing, and the world around it is changing. But while Mike (and he isn't alone) thinks the conference needs to focus more on researchers or directors and executives, I think the real opportunity is for Black Hat to return to its roots and serve first and foremost as a conduit to bring (mostly) hard-core offensive research to defensive security professionals and executives.

This is no easy task. The only way to pull it off is to continue to appeal to both those generating offensive research and the defenders. And to do so with intense technological depth that is also translated into terms mere humans can understand and use to make security decisions, without watering it down. To focus on the research first, not the "scene," but to do so in a way that is both respectful and appealing to the community that has sustained it for so long. Even to include vendors (on the show floor) but without having them fill their booths with marketeers instead of engineers.

Now, more than ever, we need a place where offensive and defensive researchers, corporate IT pros, government defenders, and CISOs can share the same halls and focus on the latest and best research, technology, and trends. That's why Black Hat first started, and I personally think that's where we need it to go.

Rich Mogull is is founder of Securosis LLC and a former security industry analyst for Gartner

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4594
Published: 2014-10-25
The Payment for Webform module 7.x-1.x before 7.x-1.5 for Drupal does not restrict access by anonymous users, which allows remote anonymous users to use the payment of other anonymous users when submitting a form that requires payment.

CVE-2014-0476
Published: 2014-10-25
The slapper function in chkrootkit before 0.50 does not properly quote file paths, which allows local users to execute arbitrary code via a Trojan horse executable. NOTE: this is only a vulnerability when /tmp is not mounted with the noexec option.

CVE-2014-1927
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly quote strings, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "$(" command-substitution sequences, a different vulnerability than CVE-2014-1928....

CVE-2014-1928
Published: 2014-10-25
The shell_quote function in python-gnupg 0.3.5 does not properly escape characters, which allows context-dependent attackers to execute arbitrary code via shell metacharacters in unspecified vectors, as demonstrated using "\" (backslash) characters to form multi-command sequences, a different vulner...

CVE-2014-1929
Published: 2014-10-25
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.