Guest: Kymberlee Price, Microsoft
I was excited for two things happening during this year's Hacker Summer Camp excursion:
1) An opportunity to meet—in person—someone leading the bug bounty charge for quite some time: Kymberlee Price, Principal Security PM Manager - Microsoft Security Response Center's Community Programs
2) To explore and discuss the dedicated Bug Bounty micro-summit during Black Hat USA 2019
Fortunately, both of these activities came together in a single setting during Black Hat, as Marco and I got to meet Kymberlee not only to discuss the micro summit, but to also hear about her journey in InfoSec and her role in establishing some of the best practices being leveraged by the industry for some time now—specifically via her work at Microsoft, at Bugcrowd, and Microsoft (again).
I loved this having conversation and hearing Kymberlee's story.
Now it's your turn to hear it. Have a listen.
I happen to know some of the more skilled social engineers in the cybersecurity industry, and during Hacker Summer Camp 2019, Sean Martin and I were invited to meet one of the best.
You probably know her. She goes by the handle @sn0ww. This is her story.
Do you want to hear it? Of course, you do. No, really, you do. You don’t want to be the only one not listening to it, do you?
Go ahead, type your in your SSN, and click play... 🔥😇😈🔥
No doubt, we are living interesting times—full of incredible technological advancements and achievements. Yet, we still get to see the other side of the picture—cybercrime at its worst.
The dark web is peaking on a global scale. Last year, there were over 4 million users on TOR, and, with that, we are seeing some other “interesting” trends. It’s these trends which lead us to our second conversation with Charity—this time during Black Hat 2019.
We care deeply and passionately about creating a diverse cybersecurity workforce — not just when it come to gender, but also for background, origin, age, religion, neuro-makeup, and more — essentially anything and everything that makes us unique; makes us human. We hope to reach a point where we no longer have to shake the box to remind ourselves of the benefits associated with diversity, but until we reach that point, you’ll find us shaking things up at the intersection of technology, cybersecurity, and society. With this, we ask you to celebrate with us the successes these cybersecurity leaders have achieved.
Black and blue, and who knows which is which, and who is who?
It is a matter of perspective and a matter of time — and given the right knowledge, these usually change together. Don't they? What is at stake and what we are fighting for can change yesterday's foe into tomorrow's best ally. But what about today?
I believe that today in technology and infosec, we are at the crossroad where Sean and I have been waiting for a few years now. Exactly 4 years ago, when we founded ITSPmagazine, we did it because we wanted to have the conversation that media, politicians, business owners, technology experts, and politicians were not having yet - and, most still don't.
It’s also important to recognize that the products and solutions (and applications) we are building a using are comprised of multiple components from all of the place—custom, commercial, and open source—and from all over the world.
At the end of the day, we’re all speaking about code and we all need to write secure code. Start speaking about it with your peers at the inaugural AppSec Village at DEF CON 27. But first, have listen to this chat to learn more.
According to our guest for this chats on the road to Las Vegas, Jeffrey Smith, Managing Partner at Cyber Risk Underwriters, there’s been a considerable uptick in the number of policies written, especially at the small/medium business level.
Be sure to listen to this podcast to learn more about this trend and then join Jeffrey Smith, Jeremiah Grossman, and many more for the inaugural micro summit for cyber insurance at Black Hat.
Sticking with the transportation theme from some of our DEF CON 26 conversations, for this next chat we take a look under the hood of another new village introduced for DEF CON 27 — the Aviation Village.
To help us understand how multiple parties can (and are) working together to understand the risks, how to mitigate them, and the challenges getting all of the cybersecurity dots connected throughout the entire ecosystem, we connected with one of the leaders of the Aviation Village, Pete Cooper.
In this chats on the road to Hacker Summer Camp in Las Vegas, you’ll get to hear from the following Wicked6 Cyber Games contestants:
Nouran Alotaibi represents the University of North Carolina Wilmington
Team: Cyber Seahawks
Shilpa Joshy represents University Of Colorado Boulder
Franklin Pearson represents ECPI Columbia
Team: D0wn the L1ne
We have three great stories to share in this chat. Have a listen!
By Marija Atanasova
#HackerSummerCamp is almost upon us. A plethora of security conferences — Black Hat, BSides, DEF CON, Queercon, Wicked6 Games, The Diana Initiative, and so much more — are all happening in Las Vegas on the same week (Aug 3 - 11).
With the infosec community about to overtake the city in a few days, how are hackers and civilian attendees protecting their data, devices and privacy during the conference? This guide provides you with a few tips.
Three years ago, we started having our Chats On The Road to Las Vegas.
As we are gearing up to cover three more conferences, we are having our pre-event conversations for each one. As we are planning to make all them a recurring series, this particular podcast is already part of a solid ITSPmagazine tradition: the third Chats on the Road conversation with Black Hat General Manager, Steve Wylie. This episode kicks off our coverage for such a pillar event in our industry.
As part of ITSPmagazine's Hacker Summer Camp 2019 coverage, the team at ITSPmagazine will be hitting the road again as Marco and Sean make their way to Las Vegas to connect with a number of the Black Hat and DEF CON conference keynote speakers, presenters, panelists, and more. We'll use this chronicle to capture the conversations we have so you can find them all in one place. Stay tuned here for more updates as we stop at various places along our journey to Hacker Summer Camp.
In 1993 according to Timeline of Computer History, we have a few major events:
Doom and Myst are released, Jurassic Park is released, Wired Magazine debuts, Apple ships the first Newton, Free BSD is launched, Gopher Stumbles, Intel Pentium microprocessor is released, Microsoft Windows NT is released, Mosaic popularize the web, online ads kicks off the commercialization of the web.
You know what else happened in 1993? A person that goes by the handle @thedarktangent created the first DEF CON hacker convention. This is his story about the past, present, and future of hacker cons.