Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 19th year. The 6-day event begins with four days (July 30 – August 2) of intense trainings for security practitioners of all levels, followed by the 2-day main event that will include more than 100 independently selected briefings, Business Hall, Arsenal, Pwnie Awards and more.
Join IBM Security at booth #908 for demos, interactive experiences and in-booth thought leadership talks, and be sure to attend the following sessions hosted by IBM X-Force Researchers:
- Speaker: Paul Sabanal, Security Researcher, IBM X-Force
- Time: August 3, 3:00pm-3:50pm
- Location: South Seas IJ
- Description: The Internet of Things is becoming a reality, and more and more devices are being introduced into the market every day. With this, the demand for technology that would ease device management, improve device security, and facilitate data analytics increases as well.In this talk, Paul will first discuss the internals of the Windows 10 IoT Core OS, including the security features and mitigations that it shares with the desktop edition. He will then enumerate the attack surface of a device running Windows 10 IoT Core as well as its potential susceptibility to malware. Paul will also talk about methods to assess the security of devices running Windows 10 IoT Core such as static/dynamic reverse engineering and fuzzing, and will end the talk with some recommendations on how to secure a Windows 10 IoT Core device.
- Speaker: Mark Vincent Yason, Security Researcher, IBM X-Force
- Time: August 4, 9:45am-10:35am
- Location: South Seas CDF
- Description: Introduced in Windows 10, Segment Heap is the native heap used in Windows app (formerly called Modern/Metro app) processes and certain system processes. This heap is an addition to the well-researched and widely documented NT heap that is still used in traditional application processes and in certain types of allocations in Windows app processes.In this presentation, Mark will discuss the data structures, algorithms and security mechanisms of the Segment Heap. Knowledge of the Segment Heap is also applied by discussing and demonstrating how a memory corruption vulnerability in the Microsoft WinRT PDF library (CVE-2016-0117) is used to create a reliable write primitive in the context of the Edge content process.
Also, don’t miss our in-booth thought leadership talks to enter a chance to win your very own droid:
1:30 Pam Cobb Crowdsourcing Security with Trusted Partners
2:00 Tina Chen Outthink Insider Threats: Reduce the Risk of Insider-related Data Loss
4:35 Diana Kelley Changing the Game with Cognitive Security
5:00 Neil Jones Think Like a Hacker (with partner Arxan Technologies)
5:30 David Byrne True Stories from Penetration Testing
6:00 Doug Franklin Threat Intelligence Currency in the API Economy
12:30 Chris Simmons Incident Investigation in 10 Minutes or Less
1:00 Michael Amarante Become Incident Response Ready (Resilient)
1:30 Jay Breztmann Conquer the Unknown, Sense it and Act
2:00 Wendi Whitmore You’ve Remediated a Breach. Now What?
2:30 Etay Maor Malware Evasion Techniques
3:00 Chris Simmons Pattern Matching vs. Deep Packet Inspection in Intrusion Prevention Systems
3:30 Robert Freeman Is it Time to Get Off the Legacy Antivirus Bus?