Locknote: Conclusions and Key Takeaways from Day 1

Presented at Black Hat Europe 2020 Virtual, Dec. 9, 2020, 3:20 p.m. (40 minutes)

<span style="font-size: 10pt;" data-mce-style="font-size: 10pt;">Join members of the Black Hat Review Board for an insightful conversation on the most pressing issues facing the InfoSec community. This Locknote will feature a candid discussion on the key takeaways from day one and how these trends will impact future InfoSec strategies.</span>

Presenters:

  • Thomas Brandstetter - Co-Founder & General Manager, Limes Security
    <p>Thomas Brandstetter is a widely recognized OT cybersecurity expert, with more than 20 years of diverse experience in multiple technical and management roles. He is known for being an enthusiastic and forward-looking character, trying to do the right thing and building things that last.</p> <p>Thomas currently has multiple active roles: He is co-founder and managing director of Limes Security, a major European OT cyber security company, he also is Professor for IT Security at University of Applied Sciences, St. Poelten and Honorary Professor for Cyber Security at DeMontfort University. On top of that, he is instructor for the SANS institute, teaching their control system security classes. His past noteworthy achievements include having been incident handler for the Stuxnet malware at Siemens, as well as the founder of the Siemens ProductCERT.</p>
  • Elisabeth Oswald - Professor, Cybersecurity Research, AAU in Klagenfurt
    Elisabeth Oswald works as an academic researcher in the area of applied crypto, in particular leakage-based attacks. She has a particular interest in the intersection of statistics, machine/deep learning and side channels, and tries to develop tools and techniques to make sophisticated leakage analysis techniques accessible in the context of securing crypto implementations against side channel attacks. She has been an active member in the crypto community for many years: she has chaired the biggest events (CHES, Eurocrypt) and is associate editor of the Journal of Cryptology and the Journal of Cryptographic Engineering. She currently holds a professorship at AAU in Klagenfurt (Austria) where she is leading the Cybersecurity research.
  • Federico Maggi - Senior Researcher, Trend Micro, Inc.
    With more than a decade of research experience in the cybersecurity field, Federico Maggi is specialized in doing threat and security analysis on virtually any system. Federico has analyzed web applications, network protocols and devices, embedded systems, radio-frequency control systems, industrial robots, cars, and mobile devices. Federico has experience on defensive technology and research, through building machine learning-based tools for intrusion and fraud detection. He's applied data visualization techniques for analyzing botnets and has gained basic malware analysis and reverse-engineering on Android-based platforms. Currently employed as a Senior Researcher with security giant Trend Micro, Federico was an Assistant Professor at Politecnico di Milano, one of the leading engineering technical universities in Italy. Aside his teaching activities, Federico co-directed the security group and has managed hundreds of graduate students. Federico has given several lectures and talks as an invited speaker at international venues and research schools, and also serves in the review or organizing committees of well-known conferences.
  • Sharon Conheady - Director, First Defence Information Security
    Sharon Conheady is the director of First Defence Information Security and a founding member of The Risk Avengers. She specialises in the human side of security and has social engineered her way into dozens of organisations across the UK and abroad, including company offices, sports stadiums, government facilities and more. Sharon has presented at security conferences including DEF CON social engineering village, Deepsec, Recon, CONFidence and InfoSec. She is the author of&nbsp;<em>Social Engineering in IT Security: Tools, Tactics, and Techniques</em>&nbsp;published by McGraw-Hill.

Links:

Similar Presentations: