10 Hottest Talks at Black Hat USA 2016
The impressive roll call of speakers offers a prime opportunity to learn from the very best of the information security world.
![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt114d0429e87eff2e/64f0dba3bfd287f4f660971c/01-image.png?width=700&auto=webp&quality=80&disable=upscale)
The Black Hat USA 2016 Conference is fast approaching—bringing scores of new briefings to life. Created nearly 20 years ago, the conference provides InfoSec professionals with a place to gather and learn from the very best. Attendees can learn about the latest risks and trends in the information security world.
This year, we find topics including critical infrastructure security; enterprise systems and datacenter technologies; vulnerabilities targeting nearly every platform, operating system and device imaginable; and the latest in vulnerability research and information security development. The slide show that follows presents 10 not-to-be-missed briefings -- two for each of these five categories:
Hottest Briefings Overall: Vehicle Networks & FIDO
Application Security
Microsoft
Mobility
Internet of Things
Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.
Advanced CAN Injection Techniques for Vehicle Networks: Charlie Miller and Chris Valasek are together again, digging deep into the digital operations of the vehicle control system as they discuss how physical, safety-critical systems react to injected CAN messages, and how these systems are often resilient to this type of manipulation. During their 50-minute presentation, Miller and Valasek will outline new methods of CAN message injection that can bypass many of these restrictions and demonstrate the results on the braking, steering and acceleration systems of an automobile.
Breaking FIDO: Are Exploits In There?: During this 25-minute session, Jerrod Chong looks at vulnerabilities hidden within FIDO deployments, how difficult they are to exploit, and how enterprises and organizations can protect themselves. Chong, the VP of Solutions Engineering at Yubico, will also discuss security soft spots for potential exploitation; man-in-the-middle attacks; exploits aimed at supporting architecture; and compromises targeting physical hardware.
Design Approaches for Security Automation: In this 50-minute briefing, Peleus Uhley, Lead Security Strategist at Adobe Systems, answers some critical application security automation questions:
What criteria should decide the best approach for security automation?
Are there simpler alternatives to building a complex, custom-built, automation environment?
Where do you deploy?
Which tools do you need?
How do you ensure your implementation will effectively enable teams rather than just create false positives at scale?
Timing Attacks Have Never Been So Practical: Advanced Cross-Site Search Attacks: Nethanel Gelernter takes advantage of having 50 minutes with his audience to present how second-order, cross-site search attacks can be used to extract sensitive information such as the email content of Gmail and Yahoo! users as well as the search history of Bing users.
The Black Hat USA 2016 Conference is fast approaching—bringing scores of new briefings to life. Created nearly 20 years ago, the conference provides InfoSec professionals with a place to gather and learn from the very best. Attendees can learn about the latest risks and trends in the information security world.
This year, we find topics including critical infrastructure security; enterprise systems and datacenter technologies; vulnerabilities targeting nearly every platform, operating system and device imaginable; and the latest in vulnerability research and information security development. The slide show that follows presents 10 not-to-be-missed briefings -- two for each of these five categories:
Hottest Briefings Overall: Vehicle Networks & FIDO
Application Security
Microsoft
Mobility
Internet of Things
Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.
Read more about:
Black Hat NewsAbout the Author(s)
You May Also Like
CISO Perspectives: How to make AI an Accelerator, Not a Blocker
August 20, 2024Securing Your Cloud Assets
August 27, 2024