Welcome!

Cloud Security Authors: Liz McMillan, Pat Romanski, Zakia Bouachraoui, Elizabeth White, Yeshim Deniz

Related Topics: Cloud Security

News Feed Item

Robert Lentz, Chief Security Officer of the Department of Defense to Keynote TechWeb's Black Hat USA 2009

Over 13 New Vulnerabilities and 18 New Tools to Debut at World-Class Security Event in Las Vegas

SEATTLE, July 10 /PRNewswire/ -- Black Hat, the world's leading family of information security events, today announced that Robert Lentz, Chief Security Officer of the Department of Defense, will keynote this year's event happening July 25-30, 2009 at Caesars Palace in Las Vegas, Nevada. Black Hat USA 2009 will host over 4,000 digital security experts, bringing together public and private sector security professionals and underground hackers. For more information visit http://www.BlackHat.com.

The world's most significant security event brings together thought-leaders from around the world to dissect the latest security trends. This year, over 13 new vulnerabilities and 18 new tools will debut. Speakers and topics with new vulnerabilities this year include:

  • Is your phone pwned? Auditing, attacking, and defending mobile devices by Kevin Mahaffey, Anthony Lineberry, and John Hering
  • Fuzzing the Phone in your Phone by Charlie Miller and Collin Mulliner
  • Weaponizing the Web: More Attacks on User-Generated Content by Nathan Hamiel and Shawn Moyer
  • CLOUDBURST: Hacking 3D (and breaking out of VMware) by Kostya Kortchinsky
  • Clobbering the Cloud! By Haroon Meer, Nick Arvanitis, and Marco Slaviero
  • More Tricks For Defeating SSL by Moxie Marlinspike
  • BitTorrent Hacks by Michael Brooks and David Aslanian
  • The Language of Trust: Exploiting Trust Relationships in Active Content by Mark Dowd, Ryan Smith, David Dewey
  • Embedded Management Interfaces: Emerging Massive Insecurity by Hristo Bokinov, Dan Boneh, Elie Bursztein
  • I just found 10 million SSNs by Alessandro Acquisti
  • "Smart" Parking Meter Implementations, Globalism, and You by Joe Grand, Jacob Appelbaum, Chris Tarnovsky

Speakers and topics with new tools this year include:

  • Exploratory Android Surgery by Jesse Burns
  • Attacking SMS by Zane Lackey and Luis Miras
  • Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone by Vincenzo Iozzo and Charlie Miller
  • Veiled: A Browser-based Darknet by Billy Hoffman and Matt Wood
  • Cloud Computing Models and Vulnerabilities by Alex Stamos, Andrew Becherer, and Nathan Wilcox
  • Exploit Rich Content by Riley Hassell
  • Gizmo: A lightweight Open Source Web Proxy by Rachel Engel
  • Practical Windows XP/2003 Heap Exploitation by John McDonald and Chris Valasek
  • Deactivate the Rootkit by Alfredo Ortega and Anibal Sacco
  • Advanced Mac OS X Rootkits by Dino Dai Zovi
  • Defensive Rewriting: A New Take on XSS/XSRF/Redirect-Phishing Defense by Bryan Sullivan
  • Breaking the "Unbreakable" Oracle with Metasploit by Chris Gates

Black Hat will also host many high-level panel discussions. Notable panelists include:

  • Dr. Linton Wells II, Distinguished Research Professor at National Defense University (NDU) and former DoD Chief Information Officer
  • Richard H. L. Marshall is the Senior Information Assurance (IA) Representative, Office of Legislative Affairs at the National Security Agency (NSA)
  • Amit Yoran, Chairman and CEO of NetWitness and former Director of the National Cyber Security Division of the Department of Homeland Security
  • Jerry Dixon, Director of Analysis for Team Cymru, Infragard's Vice President for Government Relations, and former Executive Director of the National Cyber Security Division (NCSD) & US-CERT, of the Department of Homeland Security
  • Leslie Gold, President and CEO of the Center for Democracy & Technology
  • Mark Weatherford, CISO of State of CA
  • Max Kelly, CSO of Facebook
  • Dan Crisp, COO, Information Security and Risk, Barclays
  • John Stuart, CSO of Cisco

"Black Hat is unlike any other security event," said Jeff Moss, founder of Black Hat. "This year we have a fantastic lineup of new research and presentations dealing with both the hot new buzz words in security, as well as advancements in the fundamentals of ICT security. Expect some important announcements to come out this year."

Recently, Jeff Moss, the founder of Black Hat and DEFCON, was appointed by Secretary Napolitano to the Homeland Security Advisory Council (HSAC). Moss was sworn in on Friday, June 5, 2009 during a HSAC meeting in Albuquerque, New Mexico and joins other members of the advisory council including William H. Webster, former Director of the CIA and FBI; Judge Louis Freeh, former Director of the FBI; and James R. Schlesinger, former Secretary of Defense and America's first Secretary of Energy. The complete DHS release is available at http://www.dhs.gov/ynews/releases/pr_1244227862914.shtm.

Premier sponsors of Black Hat USA 2009 include Diamond Sponsor Microsoft; Platinum Sponsors Cisco, Qualys, RSA; and Gold Sponsors Core Security Technologies, IOActive, Nitrosecurity, and Norman Data Defense Systems.

About Black Hat

The Black Hat Briefings have become the biggest and the most important security conference series in the world by serving the information security community with timely, actionable security information in a friendly, vendor-neutral environment. Black Hat provides briefings and training to leading corporations and government agencies around the world. Black Hat differentiates itself by working at many levels within the corporate, government, and underground communities. This unmatched informational reach enables Black Hat to be continuously aware of the newest vulnerabilities, defense mechanisms, and industry trends. Black Hat Briefings and Trainings are held annually in Amsterdam, Las Vegas, Tokyo, and Washington DC. Black Hat is a division of TechWeb. More information is available at http://www.blackhat.com.

About TechWeb

TechWeb, the global leader in business technology media, is an innovative business focused on serving the needs of technology decision-makers and marketers worldwide. TechWeb produces the most respected and consumed media brands in the business technology market. Today, more than 13.3 million* business technology professionals actively engage in our communities created around our global face-to-face events Interop, Web 2.0, Black Hat and VoiceCon; online resources such as the TechWeb Network, Light Reading, Intelligent Enterprise, InformationWeek.com, bMighty.com, and The Financial Technology Network; and the market leading, award-winning InformationWeek, TechNet Magazine, MSDN Magazine, Wall Street & Technology magazines. TechWeb also provides end-to-end services ranging from next-generation performance marketing, integrated media, research, and analyst services. TechWeb is a division of United Business Media, a global provider of news distribution and specialist information services with a market capitalization of more than $2.5 billion.

*13.3 million business decision-makers: based on # of monthly connections

SOURCE TechWeb

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...