Dark Reading News Desk Live at Black Hat USA 2019
Watch right here for 40 video interviews with speakers and sponsors. Streaming live from Black Hat USA Wednesday and Thursday 2 p.m. to 6 p.m. Eastern.
UPDATE -- The Dark Reading video News Desk has returned to Black Hat, bringing you more than 30 live video interviews with conference speakers and sponsors as we stream live from the expo floor this Wednesday and Thursday.
Check out some of the interviews from yesterday, posted below, and check back soon as we add more. And join us here at 2 p.m. Eastern, 11 a.m. Pacific today -- Thursday, Aug. 8 -- to learn about the newest gobsmacking vulnerability disclosures, headsmacking attack trends, clever penetration tools, inventive security solutions, and, horrifying, um, bug infestations.
Watch here and follow the action on Twitter at #DRNewsDesk.
Here's our line-up for Thursday, Aug. 8: 2 p.m. to 6 p.m. Eastern / 11 a.m. to 3 p.m. Pacific
Oded Vanunu, Head of Products Vulnerability Research, Check Point Software Technologies -- Reverse Engineering WhatsApp Encryption for Chat Manipulation and More
Jesse Rothstein, CTO and Co-Founder, ExtraHop
David Cross, Principal Security Architect, Henry Schein One -- Alexa HackerMode 2.0: Voice auto Pwn using Kali Linux and Alexa skill combo
Pablo Breuer, US Special Operations Command, Donovan Group, Innovation Officer, SOFWERX and David M. Perlman, Ph.D., Social Media professional & founder of CoPsyCon -- Hacking Ten Million Useful Idiots
Mike Price, Chief Technology Officer, ZeroFOX and Matt Price, Principal Research Engineer, ZeroFox -- Playing Offense and Defense with Deep Fakes
Chris Eng, Chief Research Officer, Veracode -- on application security
Alex Comerford, data scientist, and Jonathan Saunders, graduate student at University of Oregon -- Detecting DeepFakes with Mice
Ruben Santamarta, Principal Security Consultant, IOActive -- Reversing the Boeing 787's Core Network
Mike Sapien, Chief Analyst, Enterprise Services, Ovum -- about the MSSP market
from Informa, Eric Parizo, Senior Analyst, Ovum and Tanner Johnson, Senior Research Analyst, IHS Markit, about shake-ups at Symantec and trends in IoT security
John Weinschenk, General Manager of Enterprise Network and Application Security, Spirent -- better vulnerability identification and getting more benefit from compliance efforts
Dr. Paul Vixie, CEO, Farsight Security -- about the ethical quandaries of managing Internet infrastructure
Brian Knighton, Senior Researcher, National Security Agency Chris Delikat, Technical Lead, CNE Research, National Security AgencyGhidra: Journey from NSA Tool to Open Source
Dan Hubbard, CEO, Lacework -- cloud security
Philippe Courtot, Chairman and CEO, Qualys -- cloud security
Chris Morales, Vectra -- ransomware's evolving methods
Michael Wozniak Technical Lead for Infrastructure Security, Snap Inc and Winston Howes, Technical Lead for Application Security, Snap Inc. -- Securing Apps in the Open-By-Default Cloud
Eva Galperin, Director of Cybersecurity, Electronic Frontier Foundation -- Hacking for the Greater Good
Pramod Rana -- LMYN: Let's Map Your Network
Here was the line-up for yesterday, Wednesday, Aug. 7. Watch archives of some videos below and check back soon as we add more.
Mike Kiser, Office of the CTO, SailPoint -- Spartacus-as-a-Service: privacy via obfuscation
Eldon Sprickerhoff, Founder and Chief Innovation Officer, eSentire -- the differences between MSSPs and managed detection response
Xavier Garceau-Aranda, Senior Security Consultant, NCC Group -- Scout Suite: a multi-cloud security auditing tool
Nathan Hamiel, Head of Cybersecurity Research, Kudelski Security and Nils Amiet, Senior Cybersecurity Engineer, Kudelski Security -- FumbleChain: a purposely vulnerable blockchain
Chester Wisniewski, Principal Research Scientist, Sophos -- automated active attacks and why they're here to stay
Nikhil Mittal, Principal Trainer, PentesterAcademy -- on Active Directory attacks
Dean Sysman, CEO & Co-Founder, Axonius -- on asset management and its role in infosec
Joshua Maddux, Software Engineer / Security Researcher, PKC Security -- How Apple Scattered Vulns All Over the Internet
April Wright, Security Consultant, ArchitectSecurity.org and Jayson Street, VP of Infosec, SphereNY -- on social engineering detection and incident response
Spencer McIntyre, Technical Director of R&I,RSM -- King Phisher: A Phishing Campaign Toolkit
Tim Vidas, PhD, Senior Distinguished Engineer, Office of the CTO, Secureworks and Nash Borges, PhD, Senior Director of Engineering and Data Science, Secureworks
Patrick Cable, Director of Platform Security, Threat Stack -- Trash Taxi: Taking Out the Garbage in Your Infrastructure
Dmitry Snezkhov, Red Team Operator, X-Force Red, IBM Corporation -- Zombie Ant Farming
Mark Dufresne, Vice President, Research & Development, Endgame -- achieving security parity between Apple Mac OSX environments and Windows. Also introducing Endgame for MacOS
Gregory Conti, Senior Security Strategist, IronNet and David Raymond, Director, U.S. Cyber Range, Virginia Tech -- Information Operations and misinformation
Anthony James, VP of Products, Infoblox -- how to use DNS infrastructure to protect your data and users
Mohammed Aldoub, independent security consultant & Black Hat Trainer -- barq: The AWS Post-Exploitation Tool
Joakim Kennedy, threat intel manager, Anomali -- the impact of the security skills shortage on threat intelligence
Kimberly Zenz, on infighting among Russian security agencies
Haiyan Song, SVP and GM of Security Markets, Splunk -- the Phantom acquisition, "Dark Data," and the integration of security and analytics
Stu Sjouwerman, founder and CEO, KnowBe4 on defending against phishing and social engineering
(Image Source: Filmarkivet. Author: Unknown. Creative Commons.)
Read more about:
Black Hat NewsAbout the Author
You May Also Like
A Cyber Pros' Guide to Navigating Emerging Privacy Regulation
Dec 10, 2024Identifying the Cybersecurity Metrics that Actually Matter
Dec 11, 2024The Current State of AI Adoption in Cybersecurity, Including its Opportunities
Dec 12, 2024Cybersecurity Day: How to Automate Security Analytics with AI and ML
Dec 17, 2024The Dirt on ROT Data
Dec 18, 2024