Dark Reading News Desk Comes To You Live From Black Hat

Live video coverage from Las Vegas Wednesday and Thursday

Sara Peters, Senior Editor

August 3, 2015

4 Min Read

It's one of the busiest weeks in the infosec year. The Black Hat USA conference in Las Vegas is, and has always been, full of security researchers announcing and showing proof-of-concept demos of entirely new classes of attacks and vulnerabilities.

It's grown to include extensive training courses and now a CISO Summit featuring Dark Reading's own Tim Wilson and Kelly Jackson-Higgins. It's too much for any one person to see.

Dark Reading is here to help you through it. In addition to our usual coverage, we have a new offering: the Dark Reading News Desk -- three hours of live video interviews with Black Hat speakers and sponsors both Wednesday and Thursday, live from the show, with yours truly as your anchor. 

The best news is, you get hours and hours of me. The worst news is, you get hours and hours of me.

It's got all the risks and rewards of live broadcasts: "you heard it here first" breaking news, people falling out of chairs, terrifying shark attacks and triumphant escapes from terrifying shark attacks.

What new practices will you learn? What new vulnerabilities will be revealed? What new products will be launched? What new wig will I wear? Who knows?!

Tune in Wednesday and Thursday at 2 p.m. Eastern / 11 a.m. Pacific to find out. Here's the line-up of expert guests (subject to change):

Wednesday, Aug. 5:

2 p.m. ET / 11 a.m. PT

  • Gautam Aggarwal, CMO of Bay Dynamics, to discuss cyber risk predictive analytics

  • Rod Beckstrom, founding Director of the U.S. National Cybersecurity Center and Chairman of the Global Council on the Future of the Internet, to discuss geo-political aspects of cybersecurity

  • Roger Hellman, global marketing manager for security solutions at IBM

  • Cory Scott, director of house security at LinkedIn, to discuss a new Tactical Security Program and the art of "getting things done”

  • Adam Meyers, VP of intelligence for CrowdStrike, to discuss intelligence-driven security

  • Stacey Halota, CISO of Graham Holdings Co., to discuss mobile security

3 p.m. ET / 12 p.m. PT

  • Jeremiah Grossman, founder of WhiteHat Security and member of the Black Hat Review Board, to discuss trends in web security and give a behind-the-scenes look at the Black Hat Briefings selection process

  • Patrick Wardle,  director of research at Synack, to give a rundown about "writing bad@$$ malware for OS X"

  • John Dickson, CISSP,  principal of the Denim Group, to provide the attendee's perspective on what's cool at Black Hat

  • Greg Conti, director of the Army Cyber Institute at West Point, Tom Cross, CTO of Drawbridge Networks, and David Raymond, associate professor at West Point -- to discuss smart cities security and their session "Pen Testing a City"

  • Jason Larsen, principal security consultant at IOActive, to discuss physical attacks and smart buildings/cities

4 p.m. ET / 1 p.m. PT

  • Raffael Marty,  founder and CEO of PixlCloud, about using visualization to make log analysis and forensic investigations more efficient and effective

  • Richard Bejtlich, chief security strategist of FireEye and senior fellow of the Brookings Institution, to discuss thinking strategically about digital security

  • Paul Vixie,  CEO of Farsight Security, to discuss how passive DNS can minimize the collateral damage done by law enforcement when they take down organized cybercrime groups

  • Chris Wysopal, co-founder and CTO of Veracode, to talk about application security and vulnerabilities in fundamental components of open-source software and protocols

  • Jim Anderson, president of the Americas, BAE Systems Applied Intelligence, to discuss cyber defense, threat intelligence, and analytics

  • Engin Kirda, chief architect at Lastline, to discuss how most ransomware isn't at complex as you think

Thursday, Aug. 6:

2 p.m. ET / 11 a.m. PT

  • Marion Marschalek, malware reverse engineer on duty for Cyphort, to discuss the peculiarities of nation-state malware research

  • Arian Evans, VP of Product Strategy, RiskIQ, online digital asset inventory, discovery, and security firm

  • Bob Stratton, general partner of MACH37, to identify the hot areas are for security funding and the common mistakes that security startups make

  • Kelly Jackson-Higgins, executive editor of Dark Reading, to give a rundown of the top stories and trends out of Black Hat so far

3 p.m. ET / 12 p.m. PT

  • Shehzad Merchant, CTO Gigamon, network visibility, analytics, and security provider

  • Juan Pablo Perez-Etchegoyen, CTO of Onapsis, to discuss exploiting and defending SAP systems

  • Katie Moussouris, chief policy officer for HackerOne, to discuss how the Wassenaar Arrangement's export control of intrusion software affects the security industry

  • Paul Kurtz, former cybersecurity advisor to the White House, on the importance of information sharing between the public and private sectors, and the impacts of legislation on cybersecurity

4 p.m. ET / 1 p.m. PT

  • Dan Kaminsky, chief scientist and founder of White Ops and keynote speaker of the CISO Summit, to discuss the future of infosec

  • Alexander Matrosov and Oleksandr Bazhaniuk, security researchers for Intel's Advanced Threat Research team, to discuss attacking hypervisors using firmware and hardware

  • Adam Kozy, researcher at CrowdStrike, to discuss China's Great Cannon offensive system

  • Kyle Wilhoit, senior threat researcher at Trend Micro, to break down real attacks against gas pump monitoring systems

Read more about:

Black Hat News

About the Author(s)

Sara Peters

Senior Editor

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights