BH2020 #3

This episode is sponsored by
Full Show Notes
Segment One

A Decade After Stuxnet’s Printer Vulnerability – Peleg Hadar, Tomer Bar – BH20 #3

Guests

Peleg Hadaris a Security Researcher, in the InfoSec field for more than 7 years, interested in Vulnerability Research.

Tomer Bar is a hands-on security researcher with 20 years of unique experience in cyber security. He leads the SafeBreach Labs as the VP of Security Research. In the past, he ran research groups for the Israeli government and then led the endpoint malware research for Palo Alto Networks. His main interests are Windows vulnerability research, reverse engineering, and APT research. His recent discoveries are the PrintDemon vulnerabilities in the Windows Spooler mechanism which were a candidate in the best privilege escalation Pwnie awards. He presented his research at Black Hat 2020, Defcon 2020, 2021, 2022, SecTor, Recon, HackCon, Security Fest and Confidence conferences.

Segment Two

Planning Security Strategy Without The Black Hat Expo? – Ian McShane – BH20 #3

Guest

With almost twenty years in information security including practitioner, product manager, and a shift as the lead Gartner analyst for endpoint security and EDR, CrowdStrike’s VP of Product Marketing Ian McShane has seen a lot of crazy things in his time.

Segment Three

Defining the Dynamic Application Security Testing Market – Ferruh Mavituna – BH20 #3

Guest

Ferruh Mavituna is the founder and strategic advisor of Invicti Security, a world leader in web application security solutions. His professional obsessions lie in web application security research, automated vulnerability detection, and exploitation features. He has authored several web security research papers and tools, and delivers animated appearances at cybersecurity conferences and on podcasts. Exuberant at the possibilities open to organizations by the deployment of automation, Ferruh is keen to demonstrate what can be achieved in combination with Invicti’s award-winning products, Invicti and Acunetix.

Segment Four

Effectively Protecting Your Users Against Ransomware & Zero-Day Exploits – Danny Jenkins – BH20 #3

Guest

Danny Jenkins, CEO & Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security, is a leading cybersecurity expert with over two decades of experience building and securing corporate networks, including roles on red and blue teams. He is dedicated to educating industry professionals about the latest cyber threats and frequently speaks on the topics of ransomware and Zero Trust.

Segment Five

What’s Next In Work From Home Security? – Stephen Boyer – BH20 #3

Guest

Stephen co-founded BitSight in 2011 and serves as the Chief Technology Officer. Prior to founding BitSight, Stephen was President and Co-Founder of Saperix, a company that was acquired by FireMon in 2011. While at the MIT Lincoln Laboratory, Stephen was a member of the Cyber Systems and Technology Group where he led R&D programs solving large-scale national cybersecurity problems. Before MIT, he worked at Caldera Systems, an early Linux startup. Stephen holds a Bachelor degree in Computer Science from Brigham Young University and Master of Science in Engineering and Management from the Massachusetts Institute of Technology.

Segment Six

The Paramedic’s Guide to Surviving Cybersecurity – Rich Mogull – BH20 #3

Guest

With twenty years of experience in information security, physical security, and risk management, Rich is one of the foremost experts on cloud security, having driven development of the Cloud Security Alliance’s V4 Guidance and the associated CCSK training curriculum.

Segment Seven

Developer Security Champions – Sandy Carielli – BH20 #3

Guest

Sandy advises security and risk professionals on application and product security, with a particular emphasis on the collaboration among security and risk, product management, application development, operations, and business teams. Her research covers topics such as proactive security design, protecting modern and emerging application architectures, protection of applications in production environments, and embedding security throughout the product lifecycle.

Segment Eight

Third-Party Risk Management (TPRM) – Alla Valente – BH20 #3

Guest

Alla is a principal analyst at Forrester. Her research interests include governance, risk, and compliance (GRC), third-party risk management (TPRM), and contract lifecycle management (CLM), and Alla’s current research focuses on enterprise risk management (ERM), AI risk, and risk management frameworks. Alla helps Forrester’s security & risk clients establish strategy, adopt best practices, and select technology. Alla’s work has enjoyed wide exposure in the media, including in The Wall Street Journal, CNBC, and she speaks frequently at risk and executive conferences.

Segment Nine

The Intersection of Security & Privacy Operations – Gabe Gumbs – BH20 #3

Guest

As Spirion’s Chief Innovation Officer, Gabriel imagines and create technology that pushes data security technology forward in an increasingly complex digital world. Responsible for seeing where data security is going next and ensuring that organizations of all sizes are able to get there. With a 18+ year tenure in CyberSecurity, he has spent most of that time as a security practitioner, aligning security innovations with business objectives for Fortune 100 organizations, today Gabe is responsible for spearheading innovation across the organization through thought and product leadership.

Stay in the Know, No Smoke and Mirrors – Join Our Newsletter

You can skip this ad in 5 seconds