Date / Time: Thursday, August 07, 2014, 1:00 PM New York/10:00 AM San Francisco
Overview: Black Hat is the biggest security conference of the year and Dark Reading will be there. This year, for the first time, the editors and contributors of Dark Reading will bring you the action straight from the Mandalay Bay Convention Center in four incredible episodes of Dark Reading Radio.
Join us for the full one-hour radio show and the complete online discussion that will go along with the interviews. It's sure to be great information -- and you never know who's going to drop into the studio!
Check back here for more information on our guests and the amazing topics we'll be bringing you -- and drop into the discussion early to let us know what you want to hear about the goings-on at Black Hat!
UPDATE!
Our editors are lining up guests for our live episodes from Black Hat. First up for this program is:
Military Strategies & Cyber Security
Tom Cross -- Director of Security Research at Lancope
Just as one should never bring a knife to a gun fight, a network defender should not rely on tired maxims such as "perimeter defense" and "defense in depth." Today's adversaries are well past that. Tom Cross will share the highlights of his Black Hat talk, “The Library of Sparta,” the playbook nation-state adversaries are using to target and attack your organizations, and the new approaches you must use to defeat them.
Tom Cross works on advancing the state-of-the-art in network behavioral anomaly detection with netflow. He has over a decade of experience as a computer security researcher and thought leader. He is credited with discovering a number of critical security vulnerabilities in enterprise-class software and has published papers on collateral damage in cyber conflict, vulnerability disclosure ethics, security issues in internet routers, encrypting open wireless networks, and protecting Wikipedia from vandalism. He was previously manager of X-Force Research at IBM Internet Security Systems. He has spoken at numerous security conferences, including Black Hat, DEF CON, CyCon, HOPE, Source Boston, FIRST, and Security B-Sides.