Mandalay Bay Convention Center
August 5th - 6th
August 5 @ 10:20 A.M. - 11:10 A.M.
Mandalay Bay BDC
The underbelly of the Internet has been in a precarious condition for a while now. Even with all the knowledge about its weaknesses, we only make slow progress in implementing technology to secure it. We see BGP routing leaks on a regular basis. It almost feels like we take it for granted but at the same time it undermines our trust in the Internet. In this talk, we'll review the current situation for BGP, a foundational piece of the network we all rely on, and focus on the practical implementation of available countermeasures through live demos and examples. In and of itself, we launch a call to action for private organizations, government entities, and academia alike to roll up the sleeves and get cracking at fixing our Internet. If we want to keep trust in "The Internet of Things," we first have to build trust in the network that powers it.
Presented by Trey Ford & Kevin Bankston & Rebekah Brown
August 5 @ 4:20 p.m. - 5:10 p.m.
South Seas GH
Sharing information isn't hard - getting past backroom deals, NDAs and approval from general counsel is *very hard*. This topic is not two-dimensional, even if we are quick to weigh data sharing in the face of data breaches, and the US has several pieces of legislation in play on this *right now*.
Conservatively there are over 300,00 open jobs available in information security- efficiency, prioritization and alignment with IT has never been more important. Information sharing and threat intelligence offers hope that we can better inform priorities to align with real threats, however these solutions come with a new set of questions.
Without fail, Rapid7 throws the best party of the week at Black Hat. Join us for open bar, entertainment, and the chance to rub elbows with your peers, special guests, and party sponsors!
Wednesday August 5, 10pm – 2am
*YOU MUST BE REGISTERED AND CONFIRMED TO BE ABLE TO ATTEND THE RAPID7 BLACK HAT PARTY.
Wednesday - 5th
Thursday - 6th
A Primer on Hacking the Internet of Things
Mark Stanislav, Senior Security Consultant, Strategic Services
Security Deathmatch: Penetration Tester vs. Incident Responder
Leon Johnson, Senior Consultant, PSO
Christian Kirsch, Principal Product Marketing Manager
Mike Scutt, Senior Consultant, Analytic Response
Shoot The Messenger! Anti-Patterns in Vulnerability Handling
Tod Beardsley, Research Manager
Wim Remes, Manager, Strategic Services
Web App Scanning with AppSpider
Dan Kuykendall, Senior Director, Applications Security Products
Wednesday - 5th
Thursday - 6th
Incident Investigation with UserInsight
Patrick Haley, Senior Sales Engineer, Security Solutions
Matt Hathaway, Senior Manager, Product Management
Creating Customized Content in Nexpose
Ross Barrett, Senior Manager, Security Engineering
Metasploit Tips and Tricks
Eray Yilmaz, Senior Product Manager
Presented by Nick Percoco & Tim Wilson & Lee Kushner & Kevin Oswald
August 6 @ 3:40 p.m. - 4:30 p.m.
Mandalay Bay Room J
The bad news is that enterprise data is at risk, and the attackers have the advantage. The good news is that this situation has created a boom market for IT security professionals. How can a skilled security pro take advantage of this lucrative marketplace? What's the best way to find new job opportunities and open positions? What skills and training are the best resume builders? Which positions offer the best salaries, and how can security pros find them? If you are doing the hiring, what positions are most in demand, and how can you identify potential candidates who have the special skills you need?