Are Security Researchers Worried About Privacy? This And More With Black Hat Events GM, Steve Wylie

Chats-on-the-road-SteveWylie.jpg

By Sean Martin, host of At The Edge

This podcast episode is part of our Las Vegas cybersecurity event coverage called “Chats on the Road to Las Vegas”, which, of course, is centered around the extremely popular cybersecurity research and training event, Black Hat.

Co-founders Sean Martin and Marco Ciappelli both have a special affinity with this conference, as this is where ITSPmagazine was officially born three years ago –  at Black Hat USA 2015. In fact, our first coverage included a story with Travis Smith from Tripwire on the topic of bringing context to security events.

Of course, we covered Black Hat USA 2016 and 2017 as well, and we even covered the European installation in Amsterdam in 2015. We also have a podcast we did with Travis last year where he gave us an update on the work he is doing for small and medium businesses.

Back to the main point of this chronicle.... When we received word from the Black Hat team that the 4th edition of the Black Hat Attendee Survey was available, which was also born in 2015 by the way, we knew we wanted to get a view into what this research-hungry community had to say about the state of cybersecurity. And who better to share the findings with us than Steve Wylie, the GM for Black Hat Events.

Among a list of 18 technologies presented to our security professional attendees, only 3 were cited as effective: encryption, multi-factor, and firewalls
— Steve Wylie, GM, Black Hat Events

During our chat, Steve shares some very interesting findings from the report – such as what security professionals think about privacy and which technology categories are good and which are crap. In addition to the report, Steve also sheds some light on the themes, topics, sessions and activities that are scheduled for this year's conference. We were excited to hear the focus on the human element of security, ranging from social engineering training sessions to community workshops to help people with the stresses associated with this profession.

Research is the lifeblood of the event.
— Steve Wylie, GM, Black Hat Events

Steve packs a lot into this chat. Have a listen and enjoy! Perhaps we’ll see you in Vegas.

 

 

About Steve Wylie

Steve-Wylie.png

As General Manager of Black Hat, Steve oversees a portfolio of highly regarded information security events which take place around the world. Black Hat Briefings, created more than 20 years ago, inform security professionals with the very latest research into security vulnerabilities, risks and trends. Black Hat Trainings offer in-depth and highly technical coursework for security practitioners. Black Hat CISO and Executive Summits serve security and business leaders with the latest security trends and developments.

Steve has a deep background in leading technology events with more than 20 years of industry experience. Whether launching new conferences focused on the latest technology trends or running major industry events around the world, Steve’s passion is always centered on developing the most respected, content-rich conferences and events.

Find Steve on LinkedIn


Black Hat 2018 Facts and Links

Parisa Tabriz, Engineering Director at Google, will be the opening keynote.

The Black Hat Arsenal will present over 90 open source tools.

There will be 115 deep dive technical training sessions.

Attendees will be treated to over 120 educational and research-driven briefings.

Looking for solutions? Find them from over 300 sponsors in the business hall.

Technologies, staffing and budget findings:

  • Most still do not believe they have the staffing or budget to defend adequately against current and emerging threats.
  • 66% said they themselves do not have enough training to handle current threats and perform all of the job functions required of them.
  • Among a list of 18, only three technologies were cited as effective by security professionals – encryption, multifactor authentication tools and firewalls.
  • Passwords, one of the most widely used technologies, were dubbed ineffective by nearly 40% of respondents.

LINKS

Review Board:
https://www.blackhat.com/review-board.html

Trainings:
https://www.blackhat.com/us-18/training/schedule/index.html

Human Factors Track:
https://www.blackhat.com/us-18/briefings/schedule/index.html#track/human-factors

Program Schedule:
https://www.blackhat.com/us-18/briefings/schedule/index.html

Research Report:
https://www.blackhat.com/latestintel/06262018-where-cybersecurity-stands.html

Community Track:
https://www.blackhat.com/us-18/briefings/schedule/index.html#track/community

Community Programs:
https://www.blackhat.com/us-18/community.html

Student Scholarships:
https://www.blackhat.com/us-18/student-scholarship.html


TALKS MENTIONED

VOTING MACHINES: Lessons from Virginia – A Comparitive Forensic Analysis of WinVote Voting Machines

CRITICAL INFRASTRUCTURE: Last Call for SATCOM Security

PLATFORM: Meltdown: Basics Details Consequences

ENTERPRISE: Open Sesame: Picking Locks with Cortana

AUTO: Applied Self-Driving Car Security

PAYMENT: Black Box is Dead. Long Live Black Box!

MOBILE: Stealth Mango and the Prevalence of Mobile Surveillanceware